Browse > Article
http://dx.doi.org/10.3745/KIPSTC.2006.13C.1.055

Design and Implementation of a Keyboard Input Security System for Safe md Trusted E-Commerce  

Choi Sung-Wook (중앙대학교 컴퓨터공학부)
Kim Ki-Tae (중앙대학교 공과대학 컴퓨터공학부)
Abstract
It is growing to use the E-Commerce, recently However, if a cracking tool that detects e keyboard input is set up, users' input values and personal information could be taken away. This paper shows the design and implementation of security system that prevent the keyboard input information leaking. The ideas of thus paper are encrypting the keyboard input values with using the keyboard interrupt hooking, the browser embedding program's decrypting the values in case of need and decrypting all values in the web server. The own input control was developed for direct attacks to the browser, and that the values of password fields which are showed as *(asterisk character) won't be decrypted in the client PC is different from other commercial keyboard input security systems. Consequently, this paper shows the chance of realizing a lot safer customer information protective system than before.
Keywords
E-Commerce; Security; Keyboard; Input; Encryption;
Citations & Related Records
연도 인용수 순위
  • Reference
1 D.G. Treat, 'Keyboard encryption', IEEE Potentials, Vol.21, No.3, pp.40-42, Aug./Sep., 2002   DOI   ScienceOn
2 이상인, 박재홍, 강홍식, '허니팟을 위한 원격 키스트로크 모니터링의 설계', 정보과학회 춘계학술대회, Vol.31, No.2, pp.367-369, Oct., 2004   과학기술학회마을
3 K. Hazzah, 'Writing Windows VxDs and Device Drivers', 2nd Ed., R&D Books, 1997
4 E. Dekker, J. Newcomer, 'Developing Windows NT Device Drivers: a programmer's handbook', 1st Ed., Addison Wesley, 1999
5 T. Jamil, 'The Rijndael algorithm', IEEE Potentials, Vol.23, No.2, pp.36-38, Apr., 2004   DOI   ScienceOn
6 W. Stallings, 'Cryptography and Network Security:Principle and Practice', 3rd Ed., Prentice Hall, 2003
7 이동기, 김태한, 'C에서 어셈블러까지', 2nd Ed., pp.67-78, 월간 PC어드밴스 단행본부, 1995
8 김석주, 'C로 하드웨어 주무르기', 1st Ed., pp.117-174, pp.55-59, 가메출판사, 1999
9 N. Barkakati, R. Hyde, '메크로 어셈블러 바이블 한국어판', 1st Ed., pp.36-38, pp.695-712, 인포복, 1993
10 이현우, '네트워크 공격기법의 패러다임 변화와 대응방안', pp.10, SecurityMap, 2001