<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta>
      <journal-title-group>
        <journal-title>Information Technology and Interactions, December</journal-title>
      </journal-title-group>
    </journal-meta>
    <article-meta>
      <title-group>
        <article-title>RF Signals Encryption with AES in WDID</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Serhii Toliupa</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Volodymyr Nakonechnyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Maxym Kotov</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Valeriia Solodovnyk</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
          <xref ref-type="aff" rid="aff2">2</xref>
          <xref ref-type="aff" rid="aff3">3</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>S. Tolyupa</institution>
          ,
          <addr-line>L. Slipachuk, V. Nakonechny, M.M. Brailovsky, William Stollings [1-6]. Symmetrical</addr-line>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Taras Shevchenko National University of Kyiv</institution>
          ,
          <addr-line>Bohdana Havrylyshyna 24, Kyiv, 04116</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff2">
          <label>2</label>
          <institution>works of A.V. Yakovlev, A.A. Bezrogov and V.V. Rodina, V.N. Samka</institution>
          ,
          <addr-line>Roberto Avanzi, Bruce</addr-line>
        </aff>
        <aff id="aff3">
          <label>3</label>
          <institution>works of such authors as Kuznetsov O.O., Gorbenko I.D., Kavalchuk L.V., Dan Bone</institution>
          ,
          <addr-line>Victor Shup</addr-line>
        </aff>
      </contrib-group>
      <pub-date>
        <year>2020</year>
      </pub-date>
      <volume>0</volume>
      <fpage>2</fpage>
      <lpage>03</lpage>
      <abstract>
        <p>This article reflects the usage of symmetric encryption algorithms in remote input devices. Information on currently available encryption algorithms and the use of hash functions is provided. The difference between encryption methods with one and two keys is highlighted. AES algorithm, its data encryption scheme, and rounds are considered in detail. The description of the presented algorithm is accompanied by an example that explains the specifics of its use. A mathematical model and an example of a block encryption algorithm are illustrated. The work principles of wireless devices are given. Vulnerabilities related to wireless devices are considered and solutions are proposed. cryptography, encryption, block encryption, signal encryption, symmetric encryption, Nowadays, there are many computer systems which purpose is to improve and facilitate people's lives. Considering that the number of researchers that are interested in the field of information processing is increasing, the development of computer systems is rapidly gaining momentum. Due to the rapid development of information systems, new threats are emerging, such as breaches of confidentiality, integrity, and availability of information. To prevent possible data loss, modern information security systems are being constantly updated and improved. Since it is impossible to create a fully secure system, there is always the possibility of data theft. Therefore, there is a problem with the protection of information and telecommunications systems, which is becoming increasingly important. Given that no protection can be perfect, a method has been developed to significantly reduce data breaches. For clarity, we can give examples such as steganography and cryptography. The purpose of steganography is to conceal the information storage, whereas for cryptography - it is necessary to perform encryption is described in the scientific works of Joseph Sterling Gra, Nigel Smart, Christoph Pair, Schneier, Lars R. KnudsenMatthew J. B. Robshaw [14-21]. Studies in the field of radio signals by the following authors were also considered: V. Saiko, S. Tolyupa, V. Nakonechny, and Dakov Serhiy</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>the
concealment
of transmitted
information
content.</p>
      <p>Using
modern
cryptographic algorithms to encrypt information, it is possible to keep it confidential, even if
unauthorized access takes place. Currently, cryptosystems are used to protect information and
telecommunications systems and other technologies, in particular, to protect critical information of a
country, individuals, businesses, or other important data, such as trade secrets or intelligence.
Therefore, the reliability of cryptosystems depends on the fulfillment of such requirements as secret
key storage, generation of pseudo-random numbers, the chosen encryption algorithm, etc [1-5].</p>
      <p>A significant contribution to the development of cryptography and cybersecurity is made by the
Jan Pelsl [7-11]. The use and operation of the AES cipher are considered in the works of Joan Damen,
Vincent Ridgman [12, 13]. The results of studies of block encryption algorithms contained in the</p>
      <p>2020 Copyright for this paper by its authors.</p>
      <p>Recent events in the world had confirmed the importance of counteracting violators and attempts
to conduct information warfare which purpose is to inflict losses. Sufficiently detailed analysis also
confirmed that along with other methods and mechanisms of information protection, those based on
cryptographic transformations of information are important. Indeed, with the right choice and
application, in accordance with the requirements of cryptographic transformations, a high level of
security could be achieved and, accordingly, the main services - confidentiality, integrity, protection
against unauthorized access, accessibility, irrefutability, etc. In cryptographic protection of
information, cryptographic stability, integrity, speed of cryptographic transformations, and
requirements set by applications are put forward and must be ensured.</p>
      <p>It is clear that cryptographic stability is an unconditional requirement, but along with it, speed is
also an unconditional requirement - it is needed to protect channels at speeds ranging from hundreds
of megabits to tens of gigabits per second, performing real-time operations. This requirement could be
met by applying cryptographic transformations such as block symmetric cipher.</p>
      <p>However, the problem of information protection during its transmission in wireless data input
devices (WDID) is still significant. This article focuses on improving the security of wireless data
input devices using cryptographic systems.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Statement of the main material</title>
      <p>Cryptography is the science that creates strategies for utilizing complex mathematical
transformations to transmit data through conveyance channels in a frame that no one but authorized
persons can get. An encryption process is a key object in the field of cryptographic research, it is the
method of changing the frame of data which is transmitted through open transmission channels [1, 2].</p>
      <p>An encryption transformation may be a set of converse numerical capacities that change plain text
into an encrypted state. There are 3 fundamental sorts of information encryption [1]: encryption
utilizing two keys; encryption with a single key; keyless encryption.</p>
      <p>The fundamental distinction between keyless, one-key, two-key transformations is within the
preparation of plain content encryption. Keyless systems do not utilize keys within the handle of
cryptographic change of plain text. Examples of such transformations are hash functions and
pseudorandom number generators [5]. Hash is a function that changes an input of self-assertive size
information into a fixed-length bit string and is executed employing a particular calculation.</p>
      <p>Usually hash capacities are utilized for construction of special identifiers, calculation of
checksums for errors detection that happen amid transmission of data, seeking for copies in
arrangement of information sets, construction of acquainted arrays, storing of passwords in security
frameworks within the frame of a hash code [6, 7]. One-key systems utilize a key to encrypt and
decrypt information within the process of cryptographic change of data. The encryption key may
comprise numbers, words, or symbols. Since everyone with access to a key can decrypt the data, such
a key should be kept in secret, and be known exclusively for the sender and recipient, to guarantee
encryption unwavering quality [5]. The utilization of the one-key system is shown in Figure 1.
1. first user creates two keys - public and private;
2. then the first user passes the public key to the individual who sends the message, and leaves
the private key for himself;
3. after receiving the public key, second user encrypts the data utilizing that key and sends the
encrypted text.</p>
      <p>The only person that can decrypt this message is a private key proprietor. It isn't conceivable to
decrypt this message with the public key. In this manner, it isn't required to utilize classified
communication channels to transmit the key. The scheme of the asymmetric system usage is shown in
Figure 2.</p>
      <p>The quality of the encryption is measured by the time that it takes to decrypt the content with brute
force which is checking all conceivable key combinations. An algorithm is unsafe if half of all
conceivable key combinations may be checked in a brief time. Modern computers will be able to get a
128-bit key in billions of years, and in turn, 256-bit keys are considered secure and hypothetically
able to resist the onslaught of quantum computers [8-11].</p>
      <p>Cryptographic information protection systems that are practically used, usually have such a length
of the message protected by the symmetrical block encryption that significantly exceeds the length of
the encryption key. In this case, the criterion of unconditional stability of the used cipher is not met,
and in such conditions, it is advisable to introduce a polynomial criterion, which implies the existence
of restrictions on the computing resources of the attacker and the time during which the cipher
remains stable. The polynomial criterion leads to a practical criterion of stability - the impossibility of
implementing an attack on the cipher in a modern computer base for a long time.</p>
      <p>Additionally, given the possibility of improving cryptanalytic methods, the criterion of "margin of
resistance" to analytical attacks is introduced - the complexity of the attack on the whole algorithm
should be much higher than the complexity of force attacks. Typically, this criterion considers a
version of a symmetric block encryption algorithm with a reduced number of cycles that is vulnerable
to cryptographic analysis. The difference in the number of cycles determines the margin of stability of
the algorithm for a particular cryptanalytical attack.</p>
      <p>To assess the cryptographic stability of the overall structure of the cipher, it is advisable to
introduce another criterion that considers the possibility of excluding any operations or replacing
them with less complex operations (for example, on some input sets the addition operation modulo 232
is close or equivalent to the addition operation modulo 2). In this case, the full-cycle version of the
simplified cipher must remain resistant to analytical attacks.</p>
      <p>It should also be borne in mind that most modern analytical attacks, primarily such as differential
and linear cryptanalysis, are statistical. When performing cryptanalysis to obtain a key, a large
amount of encryption is performed, and on the basis of ciphertexts, subkey options are formed.</p>
      <p>When processing a large enough sample of ciphertexts generated on one key, the correct value of
key bits is more common than other options. Obviously, the probability of finding the correct pair
(which suggests the correct value of the key) depends on the statistical properties of the cipher, and to
increase the complexity of cryptanalysis, the properties of the cryptogram should be close to the
properties of a random sequence. Therefore, a necessary (but not sufficient) condition for the stability
of the cipher to analytical attacks is to ensure good statistical properties of the original sequence
(ciphertexts). To protect the cipher from algebraic attacks, it is necessary that there is no way to
practically build a system of equations that link plaintext, cryptogram, and encryption key, or there is
no way to solve such systems in polynomial time.</p>
      <p>While constructing cryptographic protection, it is necessary to consider the possibility of
organizing attacks on the implementation (change in temperature of the electronic device, input
voltage, the appearance of ionizing radiation, measurement of currents consumed, execution time,
etc.). Such attacks can be effective against all cryptographic algorithms, and protection against such
attacks requires engineering solutions when designing cryptographic information security tools.</p>
      <p>There are two sorts of symmetric encryption [11]:
1. block encryption;
2. stream encryption.</p>
      <p>The names of these types were inferred from the strategy of input content processing. Block
encryption process operates with settled pieces such as 128 bits by applying encryption
transformations and 128, 192, or 256-bit key.</p>
      <p>
        The block cipher scheme is shown on Figure 3.
shifted to the left by three positions, if further transfer to the left is not possible, the countdown
continues from the end of the line.
3. MixColomns - performs byte mixing in the columns of the matrix. Each column of the State
matrix is used as a polynomial over the field GF (
        <xref ref-type="bibr" rid="ref28">28</xref>
        ) and multiplied by a fixed polynomial c (x).
4. AddRoundKey - an operation that performs a byte summation modulo 2 of each element of
the State matrix, with each corresponding element of the round key matrix.
      </p>
      <p>The following transformations are performed for the decryption round:
1. InvShiftRows;
2. InvSubBytes;
3. AddRoundKey;
4. InvMixColomns.</p>
      <p>The last round of encryption differs from the others in that it does not activate the MixColomns
conversion [13]. Figure 5 presents a scheme of the transformations in each encryption and decryption
rounds. It is important to estimate the cryptographic stability of an algorithm according to the
Kerckhoffs theorem, considering that the attacker knows all the procedures for transforming the input
text that the algorithm performs. This means that only encryption key remains in secret [14, 15].</p>
      <p>The time required to check all possible key combinations from the assailant's side dictates whether
it is rational to conduct a brute force, as data encryption with a longer key is far more reliable.</p>
      <p>For illustration, let's take a key with a length of 4 bits, utilizing the essential laws of combinatorics
it is conceivable to calculate all possible combinations: S = 2 * 2 * 2 * 2 = 16. In this way, the
number of possible alternatives is S = 16. Suppose we have 100 machines that check 10,000,000
combinations of encryption key per second, the algorithm is considered to be unsafe if half of the
variants could be checked in a short period of time. With those parameters, Table 1 was made.
Considering the results of measurements in Table 1, it can be inferred that the 128-bit length key
encrypts the data securely. The 256-bit key is theoretically resistant to the brute-force attack of
quantum computers.</p>
    </sec>
    <sec id="sec-3">
      <title>3. Block encryption mathematical basics</title>
      <p>Block encryption is an encryption scheme that uses transformations at every clock of its operation,
depending on the algorithm chosen at the start of its operation. The block cipher algorithm is
considered to be a substitution cipher, but its main characteristic is that there is a large alphabet in this
cipher. The series of binary numbers 0 and 1, i.e. binary data of a certain size [16-21]. Let's take a
block of size N (sequences 0 and 1) as an example of how this method works: p = (p0, p1, p2,…,
pN1) Î Z2, N, where p Î Z2, N is a vector represented by fixed lengths 0 and 1. Then we get the number's
binary presentation by substituting the details in the formula:</p>
      <p>−1
|| || =
∑ 2 − −1  .</p>
      <p>=0</p>
      <p>
        Then it becomes obvious that the reliability of the cipher depends on the size of the replacement
tables, which cannot be physically represented due to the size of their volumes. Let's create the
following table. For example, let's take N = 5, then table will look like the following one:
(
        <xref ref-type="bibr" rid="ref1">1</xref>
        )
Table 2
Replacement table
(0,0,0,0,0)→0
(
        <xref ref-type="bibr" rid="ref1">0,0,1,0,0</xref>
        )→4
(
        <xref ref-type="bibr" rid="ref1">0,1,0,0,0</xref>
        )→8
(
        <xref ref-type="bibr" rid="ref1 ref1">0,1,1,0,0</xref>
        )→12
(
        <xref ref-type="bibr" rid="ref1">1,0,0,0,0</xref>
        )→16
(
        <xref ref-type="bibr" rid="ref1 ref1">1,0,1,0,0</xref>
        )→20
(
        <xref ref-type="bibr" rid="ref1 ref1">1,1,0,0,0</xref>
        )→24
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1">1,1,1,0,0</xref>
        )→28
(
        <xref ref-type="bibr" rid="ref1">0,0,0,0,1</xref>
        )→1
(
        <xref ref-type="bibr" rid="ref1 ref1">0,0,1,0,1</xref>
        )→5
(
        <xref ref-type="bibr" rid="ref1 ref1">0,1,0,0,1</xref>
        )→9
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1">0,1,1,0,1</xref>
        )→13
(
        <xref ref-type="bibr" rid="ref1 ref1">1,0,0,0,1</xref>
        )→17
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1">1,0,1,0,1</xref>
        )→21
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1">1,1,0,0,1</xref>
        )→25
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1 ref1">1,1,1,0,1</xref>
        )→29
(
        <xref ref-type="bibr" rid="ref1">0,0,0,1,0</xref>
        )→2
(
        <xref ref-type="bibr" rid="ref1 ref1">0,0,1,1,0</xref>
        )→6
(
        <xref ref-type="bibr" rid="ref1 ref1">0,1,0,1,0</xref>
        )→10
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1">0,1,1,1,0</xref>
        )→14
(
        <xref ref-type="bibr" rid="ref1 ref1">1,0,0,1,0</xref>
        )→18
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1">1,0,1,1,0</xref>
        )→22
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1">1,1,0,1,0</xref>
        )→26
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1 ref1">1,1,1,1,0</xref>
        )→30
(
        <xref ref-type="bibr" rid="ref1 ref1">0,0,0,1,1</xref>
        )→3
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1">0,0,1,1,1</xref>
        )→7
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1">0,1,0,1,1</xref>
        )→11
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1 ref1">0,1,1,1,1</xref>
        )→15
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1">1,0,0,1,1</xref>
        )→19
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1 ref1">1,0,1,1,1</xref>
        )→23
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1 ref1">1,1,0,1,1</xref>
        )→27
(
        <xref ref-type="bibr" rid="ref1 ref1 ref1 ref1 ref1">1,1,1,1,1</xref>
        )→31
      </p>
      <p>The block cipher is indicated as follows:  ∈  (Z2,N); π∶p → q = π (p), where p = (p0, p1,
p2,…, pN-1), q = (q0, q1, q2,…, qN-1). As described above, a block cipher is a special case of a broad
alphabet replacement, but due to its common use today, this type of cipher is considered separately,
since it is much simpler and more convenient to explain it with algorithms.</p>
      <p>Many cryptosystems are implemented using block ciphers, since constructing a chain of bytes
preencrypted by this algorithm is the process by which they are used. This allows the encryption of
information which batch volume is unlimited [16].</p>
      <p>The source text is encrypted with the replacement π, which is selected from the complete
symmetric group. Then, even with this cipher knowledge, an attacker who attempts to conduct an
attack and attempts to match the encrypted and source text pi ↔ qi, 0 ≤ i ≤ m, cannot locate the source
text that has the following correspondence: q ∉ {qi} [20]. Then it would be correct to say that the
block cipher is a special case of replacement by a mono-alphabet, and its alphabet can be written as
follows:</p>
      <p>
        2 =  2, . (
        <xref ref-type="bibr" rid="ref2">2</xref>
        )
      </p>
      <p>P[K]- this is a subset of the SYM(Z2,N) symmetric group and the cipher key block scheme. It is
indexed by the k ∈ K parameter, where the value is k and the key space is K.</p>
      <p>The expression P[K] is a mathematical notation:</p>
      <p>
        [ ] = {π{k}: k ∈ K} (
        <xref ref-type="bibr" rid="ref3">3</xref>
        )
      </p>
      <p>As for N = 5, we use the same table construction theory, and we will consider other instances. Let
N = 64 and then each SYM(Z2,N) element can potentially be regarded as a substitute, so that K =
SYM(Z2,N).</p>
      <p>It is accompanied by the following statements:
 264 are 64 digits, but the intruder is unable to hold a directory with a size of approximately 264
≈ 1.8 ≈ 1019 lines;
 the attempt to obtain the key is equal to (264).</p>
      <p>The integrity of block cipher systems is demonstrated by the alphabet Z2,64, the key space K =
SYM(Z2,N) and, most significantly, the size of the 64-bit block character input directory, given that the
number of keys is 264, or that it is beyond its capabilities, an attempt to acquire a key by an attacker is
impossible.</p>
      <p>At the same time, the attacker faces the problem of insufficient resources, which limits its
capabilities, thereby ensuring the proper functioning of the system. This is similar to the situation
when an attacker tries to perform cryptanalysis of text data.</p>
      <p>It is unfortunate to realize that both the attacker and the developer have the same problem. The
reasons for this problem are explained by the following factors [16]:
 the developer himself does not have the opportunity to build a method in which 264 substitute
SYM (Z2,64) could be implemented;
 the intruder is unable to read any of this group's keys.</p>
      <p>For a block cipher, it is possible to formulate the following specifications [16]:
 N-should be at least 64 and more than 64 ideally. This is important when generating a
directory for complications;
 the space of the keys should be as wide as possible in order to exclude the risk of choosing
them;
 π {k, p}: p → y = π {k, p} - the relation between the source and the cyphertext must be
complicated in such a way that statistical or analytical analysis methods can not be used on the
basis of the correspondence between the source text or the key.</p>
      <p>Therefore, it follows that the crypto algorithm used to encrypt the data should be perfectly reliable,
and that could be done if the output is readable only in case when key variants are known. Turning to
the theory of probability, we understand that after searching for half of all keys, the necessary key will
be found with a probability of 0.5. It follows that the stability of the block cipher depends entirely on
the length of the key. This causes the stability of the cipher that increases exponentially at the same
time with the length of the key.</p>
      <p>And even though we could presume that the key sorting would be carried out in a special
multiprocessor device, it would take too long to split a 128-bit key. Then we understand that it is
irrational to decrypt by frontal assault. All this, of course, refers only to perfect ciphers, the
implementation of which, due to different physical factors, is impossible [18].</p>
    </sec>
    <sec id="sec-4">
      <title>4. Remote input devices signal encryption</title>
      <p>There are numerous wireless input devices in access nowadays. As the devices of wireless
information input we consider - the gadget of remote transmission of the entered information to the
computer (wireless data input device WDID). Examples of such gadgets are remote consoles or mice,
remote headsets, touch input gadgets, etc.</p>
      <p>WDID gadgets transmit data through radio waves with a frequency from 27 MHz to 2.4 GHz.
WDIDs perform their work with a transmitter and a collector [23, 24]. The fundamental issue with
gadgets that transmit data at 2.4 GHz is that there's no uniform standard for transmitted data
protection. In case of connection of the devices such as wireless laptop mouse without device
authentication, the possibility of cursor manage interception takes place. A few models of wireless
keyboards use signal encryption but, in most cases, the safety of wireless devices isn't always getting
a lot of interest.</p>
      <p>So, for example, computer mouse signal encryption is not commonly used, and keyboard signal
encryption is also not performed. This permits attackers to intercept signals and get personal records.
Regardless of keyboard encryption, the threat remains feasible. An example of a records acquisition
technique is Mousejack. Even such tremendous businesses as Dell, Logitech, Microsoft, HP, Amazon,
Gigabyte, and Lenovo will now not be able to face up to this assault [25]. This assault may be
accomplished at distances of up to one hundred meters, and all that is needed for an attacker is a USB
dongle [25-28].</p>
      <p>The essence of this attack is in the following stages. A wireless keyboard and a wireless mouse use
USB-dongle for signal transmission. a few models of keyboards encrypt those signals, but the
majority of mice do not. In the case of keyboards, this works as follows [24]: only USB dongle has
the encryption key, which makes it the only item that has the potential to decrypt a signal, an attacker,
even though he intercepts that signal, will no longer be able to decrypt it. But as it was stated most of
the mouses are not encrypting their broadcast and so the attacker is able to receive unencrypted
packets. Figure 7 shows the 1-3 phases of this attack.</p>
      <p>The following happens during the first three steps: the user determines the shift (x, y) of the mouse
location coordinates, and the transmitter in the mouse transmits the radio signals without encryption
to the USB-dongle. At the same time, hackers intercept unencrypted signals using their own
personalized USB dongle.</p>
      <p>Figure 8 shows the 4-6 phases of the attack on MouseJack.</p>
      <p>The attacker sends a series of characters to the user's machine during Step 7-9. If all the stages
shown above have succeeded, the hacker has full access to the computer of the victim [25]. The
vulnerability can be used on all operating systems since this vulnerability does not apply to operating
system vulnerabilities. An intruder can install malware, access computer data, delete data,
compromise its integrity or availability using this vulnerability.</p>
      <p>The use of reliable encryption algorithms, such as the AES algorithm discussed above, is therefore
a way to protect against this weakness in the signal transmission mechanism of WDID. Simple
identification of devices trying to send USB dongle packets is required to be established. The
downside of using encryption is an expansion in response time, that is, the pacing.</p>
      <p>The attacker sends a sequence of requests to connect to the USB dongle during 4-6 stages, then the
USB dongle receives the sequence of these requests and connects to the computer of the user [25].</p>
      <p>Figure 9 demonstrates the 7-9 stages of the assault on MouseJack.</p>
    </sec>
    <sec id="sec-5">
      <title>5. Conclusions</title>
      <p>Today, for information and cybersecurity practitioners, data protection is a top priority. Among the
enormous variety of attacks and attempts to steal data, development of the successful defenses is
becoming increasingly difficult for professionals.</p>
      <p>Every action has its implications and, thus, emerging technology, which on the one hand, makes
our lives simpler and, on the other hand, creates new challenges to the security, integrity, and
availability of information within the system. This article is intended to cover methods of defense
against the capture of information while entering it using wireless data input devices. Therefore, the
article provides a general overview of encryption algorithms as one of the forms of information
security. There is a list of the most popular forms of encryption and information about them.
Examples of how such approaches are implemented during data protection are also added. As the
most prevalent algorithm to date, this article highlights symmetric encryption algorithms, namely the
AES algorithm. Its benefits, drawbacks, and variety are emphasized. Block encryption algorithms are
considered and their mathematical model is constructed. It should be kept in mind that there are some
benefits to the usage of the algorithm, namely reliability. In order to encrypt radio frequency (RF)
signals due to vulnerabilities that may occur because of unencrypted RF signal transmission, it is
proposed to use symmetric cryptographic algorithms in wireless data input devices.</p>
    </sec>
    <sec id="sec-6">
      <title>6. References</title>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]. Dan Boneh,
          <string-name>
            <given-names>Victor</given-names>
            <surname>Shoup</surname>
          </string-name>
          ,
          <source>A Graduate Course in Applied Cryptography, version 0</source>
          .4, Stanford University, Standford,
          <year>September 2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          [2].
          <string-name>
            <given-names>S.</given-names>
            <surname>Toliupa</surname>
          </string-name>
          ,
          <string-name>
            <surname>L Slipachuk</surname>
          </string-name>
          ,. V.
          <article-title>Nakonechnyi. The Process of the Critical In-frastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine</article-title>
          ,
          <source>3rd International Conference on Advanced Information and Communications Technologies, Proceedings: AICT</source>
          <year>2019</year>
          , Lviv,
          <year>2019</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          [3].
          <string-name>
            <given-names>S.V</given-names>
            <surname>Toliupa</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.S.</given-names>
            <surname>Nakonechny</surname>
          </string-name>
          .,
          <string-name>
            <given-names>N.N.</given-names>
            <surname>Brailovskyi</surname>
          </string-name>
          ,
          <source>Building Cyber-Security Systems of Information Networks Based on Intellectual Technologies</source>
          , p.
          <fpage>620</fpage>
          ,
          <article-title>Scientific &amp; practical cyber security journal (SPCSJ) №1</article-title>
          ,
          <string-name>
            <surname>Kharkiv</surname>
          </string-name>
          , SMIT Company,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          [4]. William Stallings,
          <source>Cryptography and Network Security Principles and Practices</source>
          , 4th ed.,
          <string-name>
            <surname>Prentice</surname>
            <given-names>Hall</given-names>
          </string-name>
          , New Jersey,
          <year>2005</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>[5]. 60 cryptoalgorithms. Part one: Keyless CAs, URL: https://www.pvsm.ru/algoritmy/225093#begin</mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          [6]. Bruce Schneier.
          <article-title>Applied cryptography. Protocols, algorithms, source texts in the C language</article-title>
          , 20th ed., New Jersey, Wiley,
          <year>1995</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [7]. Joseph Sterling Grah, Hash Functions In Cryptography, The University of Bergen, Bergen, Norway,
          <year>2008</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [8]. What Is Symmetric Key Cryptography?, URL: https://www.binance.vision/security/what-issymmetric
          <string-name>
            <surname>-</surname>
          </string-name>
          key-cryptography
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [9]. Nigel Smart,
          <source>Cryptography: An Introduction, 3rd edition</source>
          ,
          <string-name>
            <surname>Mcgraw-Hill College</surname>
          </string-name>
          , New York City, NY,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [10].
          <article-title>Symmetric-key algorithm</article-title>
          , URL: https://en.wikipedia.org/wiki/Symmetric-key_algorithm
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [11].Christof Paar, Jan Pelzl, Understanding Cryptography, Springer-Verlag Berlin Heidelberg, Berlin,
          <year>2010</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [12].Joan Daemen, Vincent Rijmen, AES Proposal: Rijndael, Belgium,
          <year>1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [13].Joan Daemen, Vincent Rijmen,
          <source>The Design of Rijndael</source>
          , Springer-Verlag, Belgium,
          <year>2001</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [14].C. E. Shannon,
          <source>Communication Theory of Secrecy Systems</source>
          , volume
          <volume>28</volume>
          ,
          <string-name>
            <surname>Nokia</surname>
            <given-names>Bell Labs</given-names>
          </string-name>
          , New York, NY,
          <year>1949</year>
          . doi:
          <volume>10</volume>
          .1002/j.1538-
          <fpage>7305</fpage>
          .
          <year>1949</year>
          .tb00928.x
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>[15].Kerkhoffs principle, URL: https://dic.academic.ru/dic.nsf/ruwiki/12112</mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [16].
          <string-name>
            <given-names>A.V.</given-names>
            <surname>Yakovlev</surname>
          </string-name>
          ,
          <string-name>
            <given-names>A.A.</given-names>
            <surname>Bezbogov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.V.</given-names>
            <surname>Rodin</surname>
          </string-name>
          ,
          <string-name>
            <given-names>V.N.</given-names>
            <surname>Shamkin</surname>
          </string-name>
          , Cryptographic information protection, Tambov State Technical University Publishing House,
          <year>2006</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>[17].Block codes, URL: https://studref.com/403682/informatika/blochnye_shifry</mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [18].Roberto
          <string-name>
            <surname>Avanzi</surname>
          </string-name>
          , A Salad of Block Ciphers, Munich,
          <year>2017</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [19].Bruce
          <string-name>
            <surname>Schneier</surname>
          </string-name>
          ,
          <article-title>A self-study course in block-cipher cryptanalysis</article-title>
          ,
          <source>Cryptologia</source>
          , volume
          <volume>24</volume>
          ,
          <year>2000</year>
          . URL: https://doi.org/10.1080/
          <fpage>0161</fpage>
          -
          <lpage>110091888754</lpage>
        </mixed-citation>
      </ref>
      <ref id="ref20">
        <mixed-citation>[20].Replacement codes, URL: https://sites.google.com/site/anisimovkhv/learning/kripto/lecture/tema4</mixed-citation>
      </ref>
      <ref id="ref21">
        <mixed-citation>
          [21]
          <string-name>
            <surname>.Lars R. KnudsenMatthew J.B. Robshaw</surname>
          </string-name>
          ,
          <source>The Block Cipher Companion</source>
          , Springer-Verlag Berlin Heidelberg,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref22">
        <mixed-citation>
          [22].V.
          <string-name>
            <surname>Saiko</surname>
            ,
            <given-names>S.</given-names>
          </string-name>
          <string-name>
            <surname>Toliupa</surname>
            ,
            <given-names>V.</given-names>
          </string-name>
          <string-name>
            <surname>Nakonechnyi</surname>
          </string-name>
          , and Dakov Serhii,
          <article-title>The method for re-ducing probability of incorrect data re-ception in radio channels of terahertz frequency range, 2018 14th International Conference on Advanced Trends in Radioelecrtronics, Telecommunications</article-title>
          and Computer Engineering (TCSET),
          <year>2018</year>
          . S 11. № 215. # 174.
        </mixed-citation>
      </ref>
      <ref id="ref23">
        <mixed-citation>
          [23].
          <article-title>How Does a Wireless Keyboard and Mouse Work?</article-title>
          , URL: https://techspirited.com
          <article-title>/how-doeswireless-keyboard-mouse-work</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref24">
        <mixed-citation>
          [24].
          <article-title>How does a wireless keyboard for a computer work?</article-title>
          , URL: https://compfonyk.com
          <article-title>/kak-rabotaetbesprovodnaya-klaviatura-dlya-kompyutera/</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref25">
        <mixed-citation>
          [25].Mousejack Attack:
          <article-title>Critical Vulnerability Found in Wireless Mice and Keyboards</article-title>
          , URL: https://habr.com/ru/post/390767/
        </mixed-citation>
      </ref>
      <ref id="ref26">
        <mixed-citation>
          [26].
          <article-title>Interception of data from wireless keyboards is now available to everyone</article-title>
          , URL: https://www.securitylab.ru/news/381480.php
        </mixed-citation>
      </ref>
      <ref id="ref27">
        <mixed-citation>
          [27].'
          <string-name>
            <surname>MouseJack' Attack Bites Non-Bluetooth Wireless</surname>
            <given-names>Mice</given-names>
          </string-name>
          , URL: https://www.darkreading.com/endpoint/mousejack-attack
          <article-title>-bites-</article-title>
          <string-name>
            <surname>non-</surname>
          </string-name>
          bluetooth-wirelessmice/d/d-id/
          <fpage>1324404</fpage>
        </mixed-citation>
      </ref>
      <ref id="ref28">
        <mixed-citation>
          [28].Sklyarov D. V.
          <article-title>Hardware security keys, Art of protection and information hacking</article-title>
          , SPb, BHVPetersburg,
          <year>2004</year>
          .
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>