Ayush Gandhi and 2 OthersZephyros Koyanis David Giffin+Privacy: Public
By Zephyros Koyanis and David Giffin
Viruses and Antiviruses
This project demonstrates how encryption functions in cyber attacks and defense by creating a ransomware simulator with encrypted LAN communication and a corresponding antivirus detection system using Python and Java. The goal is to understand how cryptographic techniques are weaponized by attackers and leveraged by defenders in real-world cybersecurity scenarios.
Project Thesis
Creeper - the first virus
ILOVEYOU - Infected 10% of the internet at the time
Perplexity Comet AI - Currently spreading via Discord promotional challenges, data scraper
Viral Precedents
AIDS Trojan - First Ransomware
Viral Precedents
McAfee - "Antivirus" that acts more like a virus, including a method to prevent successful uninstallation. Made by presidential candidate and (potentially) murderer John McAfee.
History Reference
AIDS Trojan Ransomware
History Reference
AIDS Trojan Ransomware
The AIDS Trojan was a virus disguised as information on AIDS, which would include information on AIDS, your risk of AIDS, and recommendations based on your risk level.
Upon 90 computer restarts, the software would encrypt all system file names on the C: drive, demanding money for the decryption of said files.
Algorithm
Key: demokey Numkey: 3
Security Analysis
Timeline: This was used around the mid 20th century
But many modern encryptions use this function as a part of a larger algorithm
Encryption Method
Not that secure. Because the key repeats and the XOR and shift are the only operations, using a known translation(like a file header) can let people break the encryption. It isn't very easy to do without a significant time investment and computation power however.
Convert file data and text key into binary strings
Compare each bit of data with repeating key bits
Output 1 if bits differ, 0 if they match
Shift the binary by the numkey
Convert back to ASCII text
State Diagram
Full State Diagram
Ransomware
Controlware
We want to create physical representations of common uses for encryption in cybersecurity. An explanation of trojans could use the classic story of troy, different types of encryption could have different physical representations like bit shifting is really easy to show with letter or number tiles.