第一范文网 - 专业文章范例文档资料分享平台

基于伪造密码键的盘记录器和屏幕录像软件(IJCNIS-V4-N5-2)(8)

来源:用户分享 时间:2021-06-02 本文由情绪难控 分享 下载这篇文档 手机版
说明:文章内容仅供预览,部分内容可能不全,需要完整文档或者需要复制内容,请下载word后使用。下载word有问题请添加微信号:xxxxxx或QQ:xxxxxx 处理(尽可能给您提供完整文档),感谢您的支持与谅解。

Battering Keyloggers and Screen Recording Software by Fabricating Passwords

Battering Keyloggers and Screen Recording Software by Fabricating Passwords 17

the fabricated password. These two passwords are provided by user through a key generator application installed on the trusted system to generate the

intermediary CKEY which will lead to formation of final key i.e. TKEY.

Figure 4. Creation and Operation of Temporary Filter Layer (TFL) in Un-trusted Machine

B. Algorithm

a. Key generation

In this phase a unique key is generated for each user based on its original password , fabricated password and pen drive’s unique ID , this key will be used to login on un-trusted machine .The variable length key is generated. The key generated will be random in nature. The key generated by this algorithm is a combination to two strings CKEY and PKEY.

CKEY is stored in an array, which stores difference in ASCII value of OPASS and FPASS.

2. FPASS – Stores the ASCII value of the fabricated Password

3. CKEY – Difference of corresponding elements of OPASS and FPASS.

ii. Creation of PKEY( Operation P)

The PID is a combination of Vendor id, product id and the serial number of pen drive , it is a string, and the length of this string varies from pen drive to pen drive.

b. Key retrieval

In this phase, the CKEY is retrieved on untrusted system, the CKEY is obtained by subtracting the corresponding elements of TKEY and PKEY.

Figure 5. Key Generation Algorithm

PKEY is stored in an array, which is obtained by applying operation P on ASCII value PID of pendrive . Required key TKEY is stored in an array which is the sum of corresponding elements of CKEY and PKEY.

i. Creation of CKEY

The original password varies from user to user. The users are required to select a new password which will be considered as the fabricated password of same length as that of original password. Then the ASCII difference of two passwords i.e. of OPASS and FPASS is taken as CKEY.

1. OPASS – Stores the ASCII value of the original password

Figure 6. Key Retrieval Algorithm

i. Obtain TKEY

搜索“diyifanwen.net”或“第一范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,第一范文网,提供最新外语学习基于伪造密码键的盘记录器和屏幕录像软件(IJCNIS-V4-N5-2)(8)全文阅读和word下载服务。

基于伪造密码键的盘记录器和屏幕录像软件(IJCNIS-V4-N5-2)(8).doc 将本文的Word文档下载到电脑,方便复制、编辑、收藏和打印
本文链接:https://www.diyifanwen.net/wenku/1206296.html(转载请注明文章来源)
热门推荐
Copyright © 2018-2022 第一范文网 版权所有 免责声明 | 联系我们
声明 :本网站尊重并保护知识产权,根据《信息网络传播权保护条例》,如果我们转载的作品侵犯了您的权利,请在一个月内通知我们,我们会及时删除。
客服QQ:xxxxxx 邮箱:xxxxxx@qq.com
渝ICP备2023013149号
Top