Bentley, Peter ORCID: 0000-0002-6438-0028 (2023) A taxonomy of encryption and encoding algorithms used by advanced persistent threats with emphasis on bespoke encryption algorithms. Technical Report. University of Gloucestershire, University of Gloucestershire. (Unpublished)
|
Text
12874 BENTLEY Peter (2023) A taxonomy of encryption technical report.pdf - Accepted Version Available under License All Rights Reserved. Download (677kB) | Preview |
Abstract
This paper reviews encryption, encoding and compression algorithms that have been used by Advanced Persistent Threats (APT) in their attacks on Microsoft Windows systems. These algorithms have been documented by the cyber security industry mainly in the form of white papers. The algorithms range from established international encryption standards to bespoke. The paper draws on Shannon’s Law for the communications theory to support the discussion. The techniques and algorithms were analysed using C programs written for the purpose and spreadsheets. It concludes that most APTs use a level of encryption proportionate to the level of security needed but there are some misalignments with Shannon’s Law.
Item Type: | Monograph (Technical Report) |
---|---|
Uncontrolled Keywords: | Microsoft Windows; Encrypt; Decrypt; Encode; Decode; Compression; Obfuscation; Advanced Persistent Threat (APT); Malware; Monte Carlo Simulation |
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science Q Science > QA Mathematics > QA76 Computer software |
Divisions: | Schools and Research Institutes > School of Business, Computing and Social Sciences |
Research Priority Areas: | Applied Business & Technology |
Depositing User: | Pete Bentley |
Date Deposited: | 28 Jun 2023 09:44 |
Last Modified: | 28 Sep 2023 12:17 |
URI: | https://eprints.glos.ac.uk/id/eprint/12874 |
University Staff: Request a correction | Repository Editors: Update this record