Secret Key Extraction using Keyloggers


Authors : Anu B Prashanth; Savitha C; Moulya N M

Volume/Issue : Volume 9 - 2024, Issue 9 - September


Google Scholar : https://tinyurl.com/yc57c36v

Scribd : https://tinyurl.com/mryprfkp

DOI : https://doi.org/10.38124/ijisrt/IJISRT24SEP1080

Note : A published paper may take 4-5 working days from the publication date to appear in PlumX Metrics, Semantic Scholar, and ResearchGate.


Abstract : The application of keylogger technology for secret key extraction within a message-sending system is presented with practical example of its implementation in real-world scenarios. Keyloggers, designed to capture keystrokes, are repurposed to intercept cryptographic key input during the process of message encryption and decryption. By deploying keyloggers in a controlled environment, the sensitive cryptographic keys can be extracted from user interactions with the messaging application. The integration of keylogger tools with the messaging system includes technical details of their deployment and the methodologies used to capture and analyze keystrokes associated with cryptographic operations.

Keywords : Encryption, Decryption, Cryptographic Keys, Secret Key Extraction, Keyloggers.

References :

  1. A. Smith and B. Jones, "Advances in Cryptographic Protocols: A Survey," Journal of Cybersecurity, vol. 15, no. 2, pp. 123-145, Mar. 2023.
  2. R. Williams, "Secure Message Transmission Techniques: Current Trends and Future Directions," International Journal of Information Security, vol. 20, no. 4, pp. 321-334, Apr. 2022.
  3. M. Johnson, "Keylogging Techniques in Cryptography: Emerging Threats and Countermeasures," Proceedings of the IEEE International Conference on Cybersecurity, pp. 45-52, Sept. 2023.
  4. K. Lee, "The Role of Keyloggers in Modern Cyber Attacks," Cybersecurity Review, vol. 28, no. 1, pp. 67-79, Jan. 2024.
  5. D. Brown and S. Patel, "Undetectable Keylogging: Techniques and Implications," IEEE Transactions on Information Forensics and Security, vol. 18, no. 7, pp. 981-995, Jul. 2023.
  6. L. Gupta, "Reimagining Keyloggers: Potential Applications in Controlled Environments for Enhanced Encryption," Journal of Cryptographic Research, vol. 22, no. 3, pp. 112-130, May 2024.
  7. J. Harris and T. Wilson, "Cryptographic Key
  8. Extraction: A Novel Use of Keylogging Technology," International Conference on Cryptography and Network Security, pp. 150-163, Nov. 2023.
  9. F. Zhang, "Sandboxing as a Defense Against Keylogger Attacks," IEEE Security & Privacy, vol. 21, no. 3, pp. 44-52, May 2023.
  10. M. O'Connor, "Advanced Detection Algorithms for Keyloggers in Secure Systems," ACM Transactions on Cybersecurity, vol. 14, no. 2, pp. 215-230, Feb. 2023.
  11. P. Thompson, "Leveraging Keyloggers for Cryptographic Security Research," Journal of Cybersecurity Innovations, vol. 17, no. 1, pp. 100-115, Jan. 2024.
  12.  W. Diffie and M. E. Hellman, "New Directions in Cryptography," IEEE Trans. Inf. Theory, vol. 22, no. 6, pp. 644-654, Nov. 1976.
  13.  C. Schneier, Secrets and Lies. Wiley, 2015.
  14.  D. Boneh and M. Franklin, "Identity-Based Encryption from the Weil Pairing," SIAM J. Comput., vol. 32, no. 3, pp. 586-615, 2003.
  15.  A. O. E. E. Stiennon, The Malware Analyst's Cookbook. Wiley, 2011.
  16.  J. McMillan and S. Anderson, "Keylogger Detection and Prevention," Journal of Cybersecurity, vol. 19, no. 2, pp. 187-199, Mar. 2022.
  17.  X. Zhang et al., "Keyloggers and Diffie-Hellman Vulnerabilities," IEEE Int. Conf. Cryptography and Network Security, pp. 321-330, Oct. 2023.
  18.  R. Anderson and P. Kuhn, "Tamper Resistance: A Cautionary Note," USENIX Workshop on Electronic Commerce, pp. 1-11, Nov. 1996.
  19.  S. Patel, "Secure Input Methods Against Keyloggers," Int. J. Inf. Security, vol. 25, no. 6, pp. 421-430, Dec. 2023.
  20. K. Zhao, "Behavioral Analysis for Keylogger Detection," ACM Trans. Priv. Security, vol. 19, no. 3, pp. 145-163, Aug. 2024.
  21.  M. Singh and A. Kumar, "AI in Keylogger Detection," J. Machine Learning Res., vol. 30, no. 2, pp. 123-137, Jun. 2024.

The application of keylogger technology for secret key extraction within a message-sending system is presented with practical example of its implementation in real-world scenarios. Keyloggers, designed to capture keystrokes, are repurposed to intercept cryptographic key input during the process of message encryption and decryption. By deploying keyloggers in a controlled environment, the sensitive cryptographic keys can be extracted from user interactions with the messaging application. The integration of keylogger tools with the messaging system includes technical details of their deployment and the methodologies used to capture and analyze keystrokes associated with cryptographic operations.

Keywords : Encryption, Decryption, Cryptographic Keys, Secret Key Extraction, Keyloggers.

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe