Battering Keyloggers and Screen Recording Software by Fabricating Passwords
Battering Keyloggers and Screen Recording Software by Fabricating Passwords 17
the fabricated password. These two passwords are provided by user through a key generator application installed on the trusted system to generate the
intermediary CKEY which will lead to formation of final key i.e. TKEY.
Figure 4. Creation and Operation of Temporary Filter Layer (TFL) in Un-trusted Machine
B. Algorithm
a. Key generation
In this phase a unique key is generated for each user based on its original password , fabricated password and pen drive’s unique ID , this key will be used to login on un-trusted machine .The variable length key is generated. The key generated will be random in nature. The key generated by this algorithm is a combination to two strings CKEY and PKEY.
CKEY is stored in an array, which stores difference in ASCII value of OPASS and FPASS.
2. FPASS – Stores the ASCII value of the fabricated Password
3. CKEY – Difference of corresponding elements of OPASS and FPASS.
ii. Creation of PKEY( Operation P)
The PID is a combination of Vendor id, product id and the serial number of pen drive , it is a string, and the length of this string varies from pen drive to pen drive.
b. Key retrieval
In this phase, the CKEY is retrieved on untrusted system, the CKEY is obtained by subtracting the corresponding elements of TKEY and PKEY.
Figure 5. Key Generation Algorithm
PKEY is stored in an array, which is obtained by applying operation P on ASCII value PID of pendrive . Required key TKEY is stored in an array which is the sum of corresponding elements of CKEY and PKEY.
i. Creation of CKEY
The original password varies from user to user. The users are required to select a new password which will be considered as the fabricated password of same length as that of original password. Then the ASCII difference of two passwords i.e. of OPASS and FPASS is taken as CKEY.
1. OPASS – Stores the ASCII value of the original password
Figure 6. Key Retrieval Algorithm
i. Obtain TKEY
搜索“diyifanwen.net”或“第一范文网”即可找到本站免费阅读全部范文。收藏本站方便下次阅读,第一范文网,提供最新外语学习基于伪造密码键的盘记录器和屏幕录像软件(IJCNIS-V4-N5-2)(8)全文阅读和word下载服务。
相关推荐: