Assignment title: Information
IFN642 Applied Cryptography and Network Security
1 | P a g e
Anonymity and Electronic Payment
Assessment Challenge – C&C Communication and Ransom Payment
Consider the ransomware that you have been designing and developing with your group as part of
the first assessment. In this challenge, you will design a Command and Control (C&C)
Communication and a Ransom Payment scheme to ensure that:
When your ransomware infects a computer, infected computer can anonymously contact a
server controlled by you to acquire payload updates and commands. This communication should
not leak any information regarding the identity and location of yourself and the victim.
Moreover, it is desirable to protect the number of infected hosts from any third party.
Victim should be able to pay the ransom as easy and quickly as possible. Payment should not
leak any information regarding the identity and location of yourself and the victim. Moreover, it
is desirable to protect the number of victims who paid the ransom from any third parties.
Task 1. Explain in 1-2 pages your design of C&C Communication protocol:
a) What security protocols are available?
b) Which one would you prefer to use and why?
c) How would you integrate this protocol to your ransomware? Please provide a pseudocode
or flow diagram explaining the protocol details.
Task 2. Explain in 1-2 pages your design of ransom payment protocol:
a) What anonymous payment protocols are available?
b) Which one would you prefer to use and why?
c) How would you integrate this protocol to your ransomware? Please provide a pseudocode
or flow diagram explaining the protocol details.
Preparing your results
Please submit a pdf report explaining your design for C&C Communication and Ransom Payment
Protocols in 2-4 pages using text and figures, pseudocodes or flow diagrams.