With symmetric cryptography, both the sender and recipient share a key that is used to perform both encryption and
decryption.
[
enDATA_CONFIDENTIALITY ]
Only the trojan author can decrypt the ciphertext because only the author knows the needed private
decryption key.
[
enKEYSTROKE_LOGGING ]
Data is stolen during
decryption and display
[
en
MALWARE
]
MCLH CG AMG
05/07/2015
|
![]() |
![]() |