<?xml version="1.0" encoding="UTF-8"?>
<TEI xml:space="preserve" xmlns="http://www.tei-c.org/ns/1.0" 
xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" 
xsi:schemaLocation="http://www.tei-c.org/ns/1.0 https://raw.githubusercontent.com/kermitt2/grobid/master/grobid-home/schemas/xsd/Grobid.xsd"
 xmlns:xlink="http://www.w3.org/1999/xlink">
	<teiHeader xml:lang="en">
		<fileDesc>
			<titleStmt>
				<title level="a" type="main">RF Signals Encryption with AES in WDID</title>
			</titleStmt>
			<publicationStmt>
				<publisher/>
				<availability status="unknown"><licence/></availability>
			</publicationStmt>
			<sourceDesc>
				<biblStruct>
					<analytic>
						<author role="corresp">
							<persName><forename type="first">Serhii</forename><surname>Toliupa</surname></persName>
							<email>tolupa@i.ua</email>
						</author>
						<author>
							<persName><forename type="first">Volodymyr</forename><surname>Nakonechnyi</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Maxym</forename><surname>Kotov</surname></persName>
						</author>
						<author>
							<persName><forename type="first">Valeriia</forename><surname>Solodovnyk</surname></persName>
						</author>
						<author>
							<affiliation key="aff0">
								<orgName type="institution">Taras Shevchenko National University of Kyiv</orgName>
								<address>
									<addrLine>Bohdana Havrylyshyna 24</addrLine>
									<postCode>04116</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<author>
							<affiliation key="aff1">
								<orgName type="department">IT&amp;I-2020 Information Technology and Interactions</orgName>
								<orgName type="institution">KNU Taras Shevchenko</orgName>
								<address>
									<addrLine>December 02-03</addrLine>
									<postCode>2020</postCode>
									<settlement>Kyiv</settlement>
									<country key="UA">Ukraine</country>
								</address>
							</affiliation>
						</author>
						<title level="a" type="main">RF Signals Encryption with AES in WDID</title>
					</analytic>
					<monogr>
						<imprint>
							<date/>
						</imprint>
					</monogr>
					<idno type="MD5">2A4D6CFFD34F07711E0D29F1DCA6D2B9</idno>
				</biblStruct>
			</sourceDesc>
		</fileDesc>
		<encodingDesc>
			<appInfo>
				<application version="0.7.2" ident="GROBID" when="2023-03-24T09:05+0000">
					<desc>GROBID - A machine learning software for extracting information from scholarly documents</desc>
					<ref target="https://github.com/kermitt2/grobid"/>
				</application>
			</appInfo>
		</encodingDesc>
		<profileDesc>
			<textClass>
				<keywords>
					<term>cryptography</term>
					<term>encryption</term>
					<term>block encryption</term>
					<term>signal encryption</term>
					<term>symmetric encryption</term>
					<term>wireless data input devices</term>
				</keywords>
			</textClass>
			<abstract>
<div xmlns="http://www.tei-c.org/ns/1.0"><p>This article reflects the usage of symmetric encryption algorithms in remote input devices. Information on currently available encryption algorithms and the use of hash functions is provided. The difference between encryption methods with one and two keys is highlighted. AES algorithm, its data encryption scheme, and rounds are considered in detail. The description of the presented algorithm is accompanied by an example that explains the specifics of its use. A mathematical model and an example of a block encryption algorithm are illustrated. The work principles of wireless devices are given. Vulnerabilities related to wireless devices are considered and solutions are proposed.</p></div>
			</abstract>
		</profileDesc>
	</teiHeader>
	<text xml:lang="en">
		<body>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="1.">Introduction</head><p>Nowadays, there are many computer systems which purpose is to improve and facilitate people's lives. Considering that the number of researchers that are interested in the field of information processing is increasing, the development of computer systems is rapidly gaining momentum. Due to the rapid development of information systems, new threats are emerging, such as breaches of confidentiality, integrity, and availability of information. To prevent possible data loss, modern information security systems are being constantly updated and improved. Since it is impossible to create a fully secure system, there is always the possibility of data theft. Therefore, there is a problem with the protection of information and telecommunications systems, which is becoming increasingly important. Given that no protection can be perfect, a method has been developed to significantly reduce data breaches. For clarity, we can give examples such as steganography and cryptography. The purpose of steganography is to conceal the information storage, whereas for cryptography -it is necessary to perform the concealment of transmitted information content. Using modern cryptographic algorithms to encrypt information, it is possible to keep it confidential, even if unauthorized access takes place. Currently, cryptosystems are used to protect information and telecommunications systems and other technologies, in particular, to protect critical information of a country, individuals, businesses, or other important data, such as trade secrets or intelligence. Therefore, the reliability of cryptosystems depends on the fulfillment of such requirements as secret key storage, generation of pseudo-random numbers, the chosen encryption algorithm, etc <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b3">[3]</ref><ref type="bibr">[4]</ref><ref type="bibr" target="#b5">[5]</ref>.</p><p>A significant contribution to the development of cryptography and cybersecurity is made by the works of such authors as Kuznetsov O.O., Gorbenko I.D., Kavalchuk L.V., Dan Bone, Victor Shup, S. Tolyupa, L. Slipachuk, V. Nakonechny, M.M. Brailovsky, William Stollings <ref type="bibr" target="#b0">[1]</ref><ref type="bibr" target="#b1">[2]</ref><ref type="bibr" target="#b3">[3]</ref><ref type="bibr">[4]</ref><ref type="bibr" target="#b5">[5]</ref><ref type="bibr">[6]</ref>. Symmetrical encryption is described in the scientific works of Joseph Sterling Gra, Nigel Smart, Christoph Pair, Jan Pelsl <ref type="bibr">[7]</ref><ref type="bibr">[8]</ref><ref type="bibr" target="#b9">[9]</ref><ref type="bibr">[10]</ref><ref type="bibr" target="#b11">[11]</ref>. The use and operation of the AES cipher are considered in the works of Joan Damen, Vincent Ridgman <ref type="bibr" target="#b12">[12,</ref><ref type="bibr" target="#b13">13]</ref>. The results of studies of block encryption algorithms contained in the works of A.V. Yakovlev, A.A. Bezrogov and V.V. Rodina, V.N. Samka, Roberto Avanzi, Bruce Schneier, Lars R. KnudsenMatthew J. B. Robshaw <ref type="bibr" target="#b14">[14]</ref><ref type="bibr" target="#b15">[15]</ref><ref type="bibr" target="#b16">[16]</ref><ref type="bibr" target="#b17">[17]</ref><ref type="bibr" target="#b18">[18]</ref><ref type="bibr" target="#b19">[19]</ref><ref type="bibr" target="#b20">[20]</ref><ref type="bibr">[21]</ref>. Studies in the field of radio signals by the following authors were also considered: V. Saiko, S. Tolyupa, V. Nakonechny, and Dakov Serhiy <ref type="bibr">[22]</ref>.</p><p>Recent events in the world had confirmed the importance of counteracting violators and attempts to conduct information warfare which purpose is to inflict losses. Sufficiently detailed analysis also confirmed that along with other methods and mechanisms of information protection, those based on cryptographic transformations of information are important. Indeed, with the right choice and application, in accordance with the requirements of cryptographic transformations, a high level of security could be achieved and, accordingly, the main services -confidentiality, integrity, protection against unauthorized access, accessibility, irrefutability, etc. In cryptographic protection of information, cryptographic stability, integrity, speed of cryptographic transformations, and requirements set by applications are put forward and must be ensured.</p><p>It is clear that cryptographic stability is an unconditional requirement, but along with it, speed is also an unconditional requirement -it is needed to protect channels at speeds ranging from hundreds of megabits to tens of gigabits per second, performing real-time operations. This requirement could be met by applying cryptographic transformations such as block symmetric cipher.</p><p>However, the problem of information protection during its transmission in wireless data input devices (WDID) is still significant. This article focuses on improving the security of wireless data input devices using cryptographic systems.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="2.">Statement of the main material</head><p>Cryptography is the science that creates strategies for utilizing complex mathematical transformations to transmit data through conveyance channels in a frame that no one but authorized persons can get. An encryption process is a key object in the field of cryptographic research, it is the method of changing the frame of data which is transmitted through open transmission channels <ref type="bibr" target="#b0">[1,</ref><ref type="bibr" target="#b1">2]</ref>.</p><p>An encryption transformation may be a set of converse numerical capacities that change plain text into an encrypted state. There are 3 fundamental sorts of information encryption <ref type="bibr" target="#b0">[1]</ref>: encryption utilizing two keys; encryption with a single key; keyless encryption.</p><p>The fundamental distinction between keyless, one-key, two-key transformations is within the preparation of plain content encryption. Keyless systems do not utilize keys within the handle of cryptographic change of plain text. Examples of such transformations are hash functions and pseudorandom number generators <ref type="bibr" target="#b5">[5]</ref>. Hash is a function that changes an input of self-assertive size information into a fixed-length bit string and is executed employing a particular calculation.</p><p>Usually hash capacities are utilized for construction of special identifiers, calculation of checksums for errors detection that happen amid transmission of data, seeking for copies in arrangement of information sets, construction of acquainted arrays, storing of passwords in security frameworks within the frame of a hash code [6, 7]. One-key systems utilize a key to encrypt and decrypt information within the process of cryptographic change of data. The encryption key may comprise numbers, words, or symbols. Since everyone with access to a key can decrypt the data, such a key should be kept in secret, and be known exclusively for the sender and recipient, to guarantee encryption unwavering quality <ref type="bibr" target="#b5">[5]</ref>. The utilization of the one-key system is shown in Figure <ref type="figure" target="#fig_0">1</ref>. As famous over, symmetric encryption utilizes one private key to transform the plain text. If the encryption algorithm is crypto-resistant sufficiently, the only way for an assailant to decrypt data is to get a key. Two-key encryption is an information encryption method that uses two encryption keys: public and private. The main benefit of asymmetric encryption is that it is dispensed with the requirement of the key transmission through the protected secret channel <ref type="bibr" target="#b5">[5]</ref>.</p><p>In common, general steps of message exchange are <ref type="bibr" target="#b5">[5]</ref>:</p><p>1. first user creates two keys -public and private; 2. then the first user passes the public key to the individual who sends the message, and leaves the private key for himself; 3. after receiving the public key, second user encrypts the data utilizing that key and sends the encrypted text.</p><p>The only person that can decrypt this message is a private key proprietor. It isn't conceivable to decrypt this message with the public key. In this manner, it isn't required to utilize classified communication channels to transmit the key. The scheme of the asymmetric system usage is shown in Figure <ref type="figure" target="#fig_1">2</ref>. The quality of the encryption is measured by the time that it takes to decrypt the content with brute force which is checking all conceivable key combinations. An algorithm is unsafe if half of all conceivable key combinations may be checked in a brief time. Modern computers will be able to get a 128-bit key in billions of years, and in turn, 256-bit keys are considered secure and hypothetically able to resist the onslaught of quantum computers <ref type="bibr">[8]</ref><ref type="bibr" target="#b9">[9]</ref><ref type="bibr">[10]</ref><ref type="bibr" target="#b11">[11]</ref>.</p><p>Cryptographic information protection systems that are practically used, usually have such a length of the message protected by the symmetrical block encryption that significantly exceeds the length of the encryption key. In this case, the criterion of unconditional stability of the used cipher is not met, and in such conditions, it is advisable to introduce a polynomial criterion, which implies the existence of restrictions on the computing resources of the attacker and the time during which the cipher remains stable. The polynomial criterion leads to a practical criterion of stability -the impossibility of implementing an attack on the cipher in a modern computer base for a long time.</p><p>Additionally, given the possibility of improving cryptanalytic methods, the criterion of "margin of resistance" to analytical attacks is introduced -the complexity of the attack on the whole algorithm should be much higher than the complexity of force attacks. Typically, this criterion considers a version of a symmetric block encryption algorithm with a reduced number of cycles that is vulnerable to cryptographic analysis. The difference in the number of cycles determines the margin of stability of the algorithm for a particular cryptanalytical attack.</p><p>To assess the cryptographic stability of the overall structure of the cipher, it is advisable to introduce another criterion that considers the possibility of excluding any operations or replacing them with less complex operations (for example, on some input sets the addition operation modulo 2 32 is close or equivalent to the addition operation modulo 2). In this case, the full-cycle version of the simplified cipher must remain resistant to analytical attacks.</p><p>It should also be borne in mind that most modern analytical attacks, primarily such as differential and linear cryptanalysis, are statistical. When performing cryptanalysis to obtain a key, a large amount of encryption is performed, and on the basis of ciphertexts, subkey options are formed.</p><p>When processing a large enough sample of ciphertexts generated on one key, the correct value of key bits is more common than other options. Obviously, the probability of finding the correct pair (which suggests the correct value of the key) depends on the statistical properties of the cipher, and to increase the complexity of cryptanalysis, the properties of the cryptogram should be close to the properties of a random sequence. Therefore, a necessary (but not sufficient) condition for the stability of the cipher to analytical attacks is to ensure good statistical properties of the original sequence (ciphertexts). To protect the cipher from algebraic attacks, it is necessary that there is no way to practically build a system of equations that link plaintext, cryptogram, and encryption key, or there is no way to solve such systems in polynomial time.</p><p>While constructing cryptographic protection, it is necessary to consider the possibility of organizing attacks on the implementation (change in temperature of the electronic device, input voltage, the appearance of ionizing radiation, measurement of currents consumed, execution time, etc.). Such attacks can be effective against all cryptographic algorithms, and protection against such attacks requires engineering solutions when designing cryptographic information security tools.</p><p>There are two sorts of symmetric encryption <ref type="bibr" target="#b11">[11]</ref>: 1. block encryption; 2. stream encryption. The names of these types were inferred from the strategy of input content processing. Block encryption process operates with settled pieces such as 128 bits by applying encryption transformations and 128, 192, or 256-bit key.</p><p>The block cipher scheme is shown on Figure <ref type="figure" target="#fig_2">3</ref>. An example of a symmetric block encryption algorithm is the AES competition finalist, the American encryption standard -Rijndael <ref type="bibr" target="#b12">[12]</ref>. AES 128 was chosen for analysis. In this form of the algorithm, the cipher key comprises 128 bits isolated by 16 bytes that are arranged into the InputKey matrix. The InputKey comprises 4 columns. Utilizing those columns an arrangement of 44 words (w0 -w43) where each word comprises 32 bits is shaped. Thus, these words become the round keys. The AES scheme is shown in Figure <ref type="figure" target="#fig_4">4</ref>.</p><p>Considering the diagram in Figure <ref type="figure" target="#fig_4">4</ref>, encryption and decryption of messages are performed over ten rounds where each round has an operation of key addition. As an example, suppose we have 128 bits of input message A and 128 bits of round key K, at the beginning operation AddRoundKey is performed, which is XOR operation of the input text with the key: B = A XOR K, where B is 128-bit text after the operation AddRoundKey. Each round of AES encryption and decryption consists of four transformations <ref type="bibr" target="#b12">[12]</ref>.</p><p>The following transformations are performed for the encryption round:  The last round of encryption differs from the others in that it does not activate the MixColomns conversion <ref type="bibr" target="#b13">[13]</ref>. Figure <ref type="figure" target="#fig_5">5</ref> presents a scheme of the transformations in each encryption and decryption rounds. It is important to estimate the cryptographic stability of an algorithm according to the Kerckhoffs theorem, considering that the attacker knows all the procedures for transforming the input text that the algorithm performs. This means that only encryption key remains in secret <ref type="bibr" target="#b14">[14,</ref><ref type="bibr" target="#b15">15]</ref>.</p><p>The time required to check all possible key combinations from the assailant's side dictates whether it is rational to conduct a brute force, as data encryption with a longer key is far more reliable.</p><p>For illustration, let's take a key with a length of 4 bits, utilizing the essential laws of combinatorics it is conceivable to calculate all possible combinations: S = 2 * 2 * 2 * 2 = 16. In this way, the number of possible alternatives is S = 16. Suppose we have 100 machines that check 10,000,000 combinations of encryption key per second, the algorithm is considered to be unsafe if half of the variants could be checked in a short period of time. With those parameters, Table <ref type="table" target="#tab_0">1</ref> was made. Considering the results of measurements in Table <ref type="table" target="#tab_0">1</ref>, it can be inferred that the 128-bit length key encrypts the data securely. The 256-bit key is theoretically resistant to the brute-force attack of quantum computers.  </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="3.">Block encryption mathematical basics</head><p>Block encryption is an encryption scheme that uses transformations at every clock of its operation, depending on the algorithm chosen at the start of its operation. The block cipher algorithm is considered to be a substitution cipher, but its main characteristic is that there is a large alphabet in this cipher. The series of binary numbers 0 and 1, i.e. binary data of a certain size <ref type="bibr" target="#b16">[16]</ref><ref type="bibr" target="#b17">[17]</ref><ref type="bibr" target="#b18">[18]</ref><ref type="bibr" target="#b19">[19]</ref><ref type="bibr" target="#b20">[20]</ref><ref type="bibr">[21]</ref>. Let's take a block of size N (sequences 0 and 1) as an example of how this method works: p = (p0, p1, p2,…, pN-1) Î Z2, N, where p Î Z2, N is a vector represented by fixed lengths 0 and 1. Then we get the number's binary presentation by substituting the details in the formula:</p><formula xml:id="formula_0">||𝑝|| = ∑ 2 𝑁−𝑖−1 𝑝 𝑖 𝑁−1 𝑖=0 . (<label>1</label></formula><formula xml:id="formula_1">)</formula><p>Then it becomes obvious that the reliability of the cipher depends on the size of the replacement tables, which cannot be physically represented due to the size of their volumes. Let's create the following table. For example, let's take N = 5, then table will look like the following one:</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>Table 2</head><p>Replacement table (0,0,0,0,0)→0 (0,0,0,0,1)→1 (0,0,0,1,0)→2 (0,0,0,1,1)→3 (0,0,1,0,0)→4 (0,0,1,0,1)→5 (0,0,1,1,0)→6 (0,0,1,1,1)→7 (0,1,0,0,0)→8 (0,1,0,0,1)→9 (0,1,0,1,0)→10 (0,1,0,1,1)→11 (0,1,1,0,0)→12 (0,1,1,0,1)→13 (0,1,1,1,0)→14 (0,1,1,1,1)→15 (1,0,0,0,0)→16</p><p>(1,0,0,0,1)→17 (1,0,0,1,0)→18 (1,0,0,1,1)→19 (1,0,1,0,0)→20</p><p>(1,0,1,0,1)→21 (1,0,1,1,0)→22 (1,0,1,1,1)→23 (1,1,0,0,0)→24</p><p>(1,1,0,0,1)→25</p><formula xml:id="formula_2">(1,1,0,1,0)→26 (1,1,0,1,1)→27 (1,1,1,0,0)→28 (1,1,1,0,1)→29 (1,1,1,1,0)→30 (1,1,1,1,1)→31</formula><p>The block cipher is indicated as follows: 𝜋 ∈ 𝑆𝑌𝑀(Z2,N); π∶p → q = π (p), where p = (p0, p1, p2,…, pN-1), q = (q0, q1, q2,…, qN-1). As described above, a block cipher is a special case of a broad alphabet replacement, but due to its common use today, this type of cipher is considered separately, since it is much simpler and more convenient to explain it with algorithms.</p><p>Many cryptosystems are implemented using block ciphers, since constructing a chain of bytes preencrypted by this algorithm is the process by which they are used. This allows the encryption of information which batch volume is unlimited <ref type="bibr" target="#b16">[16]</ref>.</p><p>The source text is encrypted with the replacement π, which is selected from the complete symmetric group. Then, even with this cipher knowledge, an attacker who attempts to conduct an attack and attempts to match the encrypted and source text pi ↔ qi, 0 ≤ i ≤ m, cannot locate the source text that has the following correspondence: q ∉ {qi} <ref type="bibr" target="#b20">[20]</ref>. Then it would be correct to say that the block cipher is a special case of replacement by a mono-alphabet, and its alphabet can be written as follows:</p><formula xml:id="formula_3">𝑍 2 𝑁 = 𝑍 2,𝑁 .<label>(2)</label></formula><p>P[K]-this is a subset of the SYM(Z2,N) symmetric group and the cipher key block scheme. It is indexed by the k ∈ K parameter, where the value is k and the key space is K.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head>The expression P[K]</head><p>is a mathematical notation:</p><formula xml:id="formula_4">𝑃[𝐾] = {π{k}: k ∈ K}<label>(3)</label></formula><p>As for N = 5, we use the same table construction theory, and we will consider other instances. Let N = 64 and then each SYM(Z2,N) element can potentially be regarded as a substitute, so that K = SYM(Z2,N).</p><p>It is accompanied by the following statements:  2 64 are 64 digits, but the intruder is unable to hold a directory with a size of approximately 2 64 ≈ 1.8 ≈ 1019 lines;  the attempt to obtain the key is equal to (2 64 ). The integrity of block cipher systems is demonstrated by the alphabet Z2,64, the key space K = SYM(Z2,N) and, most significantly, the size of the 64-bit block character input directory, given that the number of keys is 2 64 , or that it is beyond its capabilities, an attempt to acquire a key by an attacker is impossible.</p><p>At the same time, the attacker faces the problem of insufficient resources, which limits its capabilities, thereby ensuring the proper functioning of the system. This is similar to the situation when an attacker tries to perform cryptanalysis of text data.</p><p>It is unfortunate to realize that both the attacker and the developer have the same problem. The reasons for this problem are explained by the following factors <ref type="bibr" target="#b16">[16]</ref>:</p><p> the developer himself does not have the opportunity to build a method in which 2 64 substitute SYM (Z2,64) could be implemented;  the intruder is unable to read any of this group's keys. For a block cipher, it is possible to formulate the following specifications <ref type="bibr" target="#b16">[16]</ref>:  N-should be at least 64 and more than 64 ideally. This is important when generating a directory for complications;  the space of the keys should be as wide as possible in order to exclude the risk of choosing them;  π {k, p}: p → y = π {k, p} -the relation between the source and the cyphertext must be complicated in such a way that statistical or analytical analysis methods can not be used on the basis of the correspondence between the source text or the key. Therefore, it follows that the crypto algorithm used to encrypt the data should be perfectly reliable, and that could be done if the output is readable only in case when key variants are known. Turning to the theory of probability, we understand that after searching for half of all keys, the necessary key will be found with a probability of 0.5. It follows that the stability of the block cipher depends entirely on the length of the key. This causes the stability of the cipher that increases exponentially at the same time with the length of the key.</p><p>And even though we could presume that the key sorting would be carried out in a special multiprocessor device, it would take too long to split a 128-bit key. Then we understand that it is irrational to decrypt by frontal assault. All this, of course, refers only to perfect ciphers, the implementation of which, due to different physical factors, is impossible <ref type="bibr" target="#b18">[18]</ref>.</p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="4.">Remote input devices signal encryption</head><p>There are numerous wireless input devices in access nowadays. As the devices of wireless information input we consider -the gadget of remote transmission of the entered information to the computer (wireless data input device WDID). Examples of such gadgets are remote consoles or mice, remote headsets, touch input gadgets, etc.</p><p>WDID gadgets transmit data through radio waves with a frequency from 27 MHz to 2.4 GHz. WDIDs perform their work with a transmitter and a collector <ref type="bibr">[23,</ref><ref type="bibr" target="#b24">24]</ref>. The fundamental issue with gadgets that transmit data at 2.4 GHz is that there's no uniform standard for transmitted data protection. In case of connection of the devices such as wireless laptop mouse without device authentication, the possibility of cursor manage interception takes place. A few models of wireless keyboards use signal encryption but, in most cases, the safety of wireless devices isn't always getting a lot of interest.</p><p>So, for example, computer mouse signal encryption is not commonly used, and keyboard signal encryption is also not performed. This permits attackers to intercept signals and get personal records. Regardless of keyboard encryption, the threat remains feasible. An example of a records acquisition technique is Mousejack. Even such tremendous businesses as Dell, Logitech, Microsoft, HP, Amazon, Gigabyte, and Lenovo will now not be able to face up to this assault <ref type="bibr">[25]</ref>. This assault may be accomplished at distances of up to one hundred meters, and all that is needed for an attacker is a USB dongle <ref type="bibr">[25]</ref><ref type="bibr" target="#b26">[26]</ref><ref type="bibr">[27]</ref><ref type="bibr">[28]</ref>.</p><p>The essence of this attack is in the following stages. A wireless keyboard and a wireless mouse use USB-dongle for signal transmission. a few models of keyboards encrypt those signals, but the majority of mice do not. In the case of keyboards, this works as follows <ref type="bibr" target="#b24">[24]</ref>: only USB dongle has the encryption key, which makes it the only item that has the potential to decrypt a signal, an attacker, even though he intercepts that signal, will no longer be able to decrypt it. But as it was stated most of the mouses are not encrypting their broadcast and so the attacker is able to receive unencrypted packets. Figure <ref type="figure" target="#fig_7">7</ref> shows the 1-3 phases of this attack. Figure <ref type="figure" target="#fig_9">8</ref> shows the 4-6 phases of the attack on MouseJack.</p><p>The attacker sends a series of characters to the user's machine during Step 7-9. If all the stages shown above have succeeded, the hacker has full access to the computer of the victim <ref type="bibr">[25]</ref>. The vulnerability can be used on all operating systems since this vulnerability does not apply to operating system vulnerabilities. An intruder can install malware, access computer data, delete data, compromise its integrity or availability using this vulnerability.</p><p>The use of reliable encryption algorithms, such as the AES algorithm discussed above, is therefore a way to protect against this weakness in the signal transmission mechanism of WDID. Simple identification of devices trying to send USB dongle packets is required to be established. The downside of using encryption is an expansion in response time, that is, the pacing.   </p></div>
<div xmlns="http://www.tei-c.org/ns/1.0"><head n="5.">Conclusions</head><p>Today, for information and cybersecurity practitioners, data protection is a top priority. Among the enormous variety of attacks and attempts to steal data, development of the successful defenses is becoming increasingly difficult for professionals.</p><p>Every action has its implications and, thus, emerging technology, which on the one hand, makes our lives simpler and, on the other hand, creates new challenges to the security, integrity, and availability of information within the system. This article is intended to cover methods of defense against the capture of information while entering it using wireless data input devices. Therefore, the article provides a general overview of encryption algorithms as one of the forms of information security. There is a list of the most popular forms of encryption and information about them. Examples of how such approaches are implemented during data protection are also added. As the most prevalent algorithm to date, this article highlights symmetric encryption algorithms, namely the AES algorithm. Its benefits, drawbacks, and variety are emphasized. Block encryption algorithms are considered and their mathematical model is constructed. It should be kept in mind that there are some benefits to the usage of the algorithm, namely reliability. In order to encrypt radio frequency (RF) signals due to vulnerabilities that may occur because of unencrypted RF signal transmission, it is proposed to use symmetric cryptographic algorithms in wireless data input devices.</p></div><figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_0"><head>Figure 1 :</head><label>1</label><figDesc>Figure 1: Symmetric encryption system key exchange schemeAs famous over, symmetric encryption utilizes one private key to transform the plain text. If the encryption algorithm is crypto-resistant sufficiently, the only way for an assailant to decrypt data is to get a key. Two-key encryption is an information encryption method that uses two encryption keys: public and private. The main benefit of asymmetric encryption is that it is dispensed with the requirement of the key transmission through the protected secret channel<ref type="bibr" target="#b5">[5]</ref>.In common, general steps of message exchange are<ref type="bibr" target="#b5">[5]</ref>:</figDesc><graphic coords="2,72.00,548.20,451.55,127.79" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_1"><head>Figure 2 :</head><label>2</label><figDesc>Figure 2: Asymmetric encryption system key exchange scheme</figDesc><graphic coords="3,72.05,179.52,450.83,128.55" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_2"><head>Figure 3 :</head><label>3</label><figDesc>Figure 3: Block cipher encryption process scheme Stream ciphers, in turn, work with each bit of the input content and yield bit by bit of the encrypted text. Stream ciphers convert plaintext to ciphertext, one bit per operation. The keystream generator produces a bitstream. The processes of encryption and decryption involve XOR operations between bits of plain text bitstream and keystream.An example of a symmetric block encryption algorithm is the AES competition finalist, the American encryption standard -Rijndael<ref type="bibr" target="#b12">[12]</ref>. AES 128 was chosen for analysis. In this form of the algorithm, the cipher key comprises 128 bits isolated by 16 bytes that are arranged into the InputKey matrix. The InputKey comprises 4 columns. Utilizing those columns an arrangement of 44 words (w0 -w43) where each word comprises 32 bits is shaped. Thus, these words become the round keys. The AES scheme is shown in Figure4.Considering the diagram in Figure4, encryption and decryption of messages are performed over ten rounds where each round has an operation of key addition. As an example, suppose we have 128 bits of input message A and 128 bits of round key K, at the beginning operation AddRoundKey is performed, which is XOR operation of the input text with the key: B = A XOR K, where B is 128-bit text after the operation AddRoundKey. Each round of AES encryption and decryption consists of four transformations<ref type="bibr" target="#b12">[12]</ref>.The following transformations are performed for the encryption round: 1. SubBytes -byte substitution in S-BOX, with fixed replacement table. SubBytesis a transformation that performs a nonlinear replacement of each byte of the State matrix. Using S-BOX, byte I is converted at the input to byte S = SubBytes (I), in the field GF (2). 2. ShiftRows -byte rows offset of the State matrix. During this operation, the first row of the matrix remains unchanged, the bytes of the second line are shifted to the left by one position, the elements of the third line are transferred to the left by 2 positions, the bytes of the fourth line are</figDesc><graphic coords="4,176.75,227.59,241.45,248.97" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_3"><head>1 .</head><label>1</label><figDesc>Figure 3: Block cipher encryption process scheme Stream ciphers, in turn, work with each bit of the input content and yield bit by bit of the encrypted text. Stream ciphers convert plaintext to ciphertext, one bit per operation. The keystream generator produces a bitstream. The processes of encryption and decryption involve XOR operations between bits of plain text bitstream and keystream.An example of a symmetric block encryption algorithm is the AES competition finalist, the American encryption standard -Rijndael<ref type="bibr" target="#b12">[12]</ref>. AES 128 was chosen for analysis. In this form of the algorithm, the cipher key comprises 128 bits isolated by 16 bytes that are arranged into the InputKey matrix. The InputKey comprises 4 columns. Utilizing those columns an arrangement of 44 words (w0 -w43) where each word comprises 32 bits is shaped. Thus, these words become the round keys. The AES scheme is shown in Figure4.Considering the diagram in Figure4, encryption and decryption of messages are performed over ten rounds where each round has an operation of key addition. As an example, suppose we have 128 bits of input message A and 128 bits of round key K, at the beginning operation AddRoundKey is performed, which is XOR operation of the input text with the key: B = A XOR K, where B is 128-bit text after the operation AddRoundKey. Each round of AES encryption and decryption consists of four transformations<ref type="bibr" target="#b12">[12]</ref>.The following transformations are performed for the encryption round: 1. SubBytes -byte substitution in S-BOX, with fixed replacement table. SubBytesis a transformation that performs a nonlinear replacement of each byte of the State matrix. Using S-BOX, byte I is converted at the input to byte S = SubBytes (I), in the field GF (2). 2. ShiftRows -byte rows offset of the State matrix. During this operation, the first row of the matrix remains unchanged, the bytes of the second line are shifted to the left by one position, the elements of the third line are transferred to the left by 2 positions, the bytes of the fourth line are</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_4"><head>Figure 4 :</head><label>4</label><figDesc>Figure 4: AES encryption process scheme3. MixColomns -performs byte mixing in the columns of the matrix. Each column of the State matrix is used as a polynomial over the field GF(2 8 ) and multiplied by a fixed polynomial c (x). 4. AddRoundKey -an operation that performs a byte summation modulo 2 of each element of the State matrix, with each corresponding element of the round key matrix. The following transformations are performed for the decryption round: 1. InvShiftRows; 2. InvSubBytes; 3. AddRoundKey; 4. InvMixColomns. The last round of encryption differs from the others in that it does not activate the MixColomns conversion<ref type="bibr" target="#b13">[13]</ref>. Figure5presents a scheme of the transformations in each encryption and decryption rounds. It is important to estimate the cryptographic stability of an algorithm according to the Kerckhoffs theorem, considering that the attacker knows all the procedures for transforming the input text that the algorithm performs. This means that only encryption key remains in secret<ref type="bibr" target="#b14">[14,</ref><ref type="bibr" target="#b15">15]</ref>.The time required to check all possible key combinations from the assailant's side dictates whether it is rational to conduct a brute force, as data encryption with a longer key is far more reliable.For illustration, let's take a key with a length of 4 bits, utilizing the essential laws of combinatorics it is conceivable to calculate all possible combinations: S = 2 * 2 * 2 * 2 = 16. In this way, the number of possible alternatives is S = 16. Suppose we have 100 machines that check 10,000,000 combinations of encryption key per second, the algorithm is considered to be unsafe if half of the variants could be checked in a short period of time. With those parameters, Table1was made. Considering the results of measurements in Table1, it can be inferred that the 128-bit length key encrypts the data securely. The 256-bit key is theoretically resistant to the brute-force attack of quantum computers.</figDesc><graphic coords="5,82.23,107.42,430.55,345.60" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_5"><head>Figure 5 :</head><label>5</label><figDesc>Figure 5: AES encryption and decryption rounds</figDesc><graphic coords="6,135.30,71.37,324.40,283.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_6"><head>Figure 6 :</head><label>6</label><figDesc>Figure 6: 1-3 phases of MouseJack The following happens during the first three steps: the user determines the shift (x, y) of the mouse location coordinates, and the transmitter in the mouse transmits the radio signals without encryption to the USB-dongle. At the same time, hackers intercept unencrypted signals using their own personalized USB dongle.Figure8shows the 4-6 phases of the attack on MouseJack.</figDesc><graphic coords="8,88.65,536.18,417.70,124.20" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_7"><head>Figure 7 :</head><label>7</label><figDesc>Figure 7: 4-6 phases of MouseJack</figDesc><graphic coords="9,95.75,198.49,403.06,114.05" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_8"><head>Figure 9</head><label>9</label><figDesc>demonstrates the 7-9 stages of the assault on MouseJack.</figDesc></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" xml:id="fig_9"><head>Figure 8 :</head><label>8</label><figDesc>Figure 8: 7-9 phases of MouseJack</figDesc><graphic coords="9,93.50,389.21,407.75,113.39" type="bitmap" /></figure>
<figure xmlns="http://www.tei-c.org/ns/1.0" type="table" xml:id="tab_0"><head>Table 1 Key</head><label>1</label><figDesc></figDesc><table><row><cell>Combinations</cell><cell></cell><cell></cell></row><row><cell>Key size</cell><cell>Combinations</cell><cell>Time</cell></row><row><cell>1</cell><cell>2</cell><cell>2 * 10^(-10) sec</cell></row><row><cell>2</cell><cell>4</cell><cell>4 * 10^(-10) sec</cell></row><row><cell>4</cell><cell>16</cell><cell>1.6 * 10^(-9) sec</cell></row><row><cell>8</cell><cell>256</cell><cell>2.56 * 10^(-8) sec</cell></row><row><cell>16</cell><cell>65 536</cell><cell>6.5536 * 10^(-6) sec</cell></row><row><cell>32</cell><cell>4 294 967 296</cell><cell>0.42 sec</cell></row><row><cell>56 (DES)</cell><cell>7.20575940 * 10^16</cell><cell>83.39 days</cell></row><row><cell>64</cell><cell>1.84467441 * 10^19</cell><cell>58.49 years</cell></row><row><cell>128 (AES)</cell><cell>3.40282367 * 10^38</cell><cell>1.08 * 10^21 days</cell></row><row><cell>192 (AES)</cell><cell>6.27710174 * 10^57</cell><cell>1.99 * 10^40 days</cell></row><row><cell>256 (AES)</cell><cell>1.15792089 * 10^77</cell><cell>3.67 * 10^59 days</cell></row></table></figure>
		</body>
		<back>
			<div type="references">

				<listBibl>

<biblStruct xml:id="b0">
	<monogr>
		<author>
			<persName><forename type="first">Dan</forename><surname>Boneh</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Victor</forename><surname>Shoup</surname></persName>
		</author>
		<title level="m">A Graduate Course in Applied Cryptography</title>
				<imprint>
			<date type="published" when="2017-09">September 2017</date>
		</imprint>
		<respStmt>
			<orgName>Stanford University, Standford</orgName>
		</respStmt>
	</monogr>
	<note>version 0.4</note>
</biblStruct>

<biblStruct xml:id="b1">
	<monogr>
		<title/>
		<author>
			<persName><forename type="first">S</forename><surname>Toliupa</surname></persName>
		</author>
		<author>
			<persName><surname>Slipachuk</surname></persName>
		</author>
		<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b2">
	<analytic>
		<title level="a" type="main">The Process of the Critical In-frastructure Cyber Security Management using the Integrated System of the National Cyber Security Sector Management in Ukraine</title>
		<author>
			<persName><forename type="first">V</forename><surname>Nakonechnyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">3rd International Conference on Advanced Information and Communications Technologies, Proceedings: AICT 2019</title>
				<meeting><address><addrLine>Lviv</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2019">2019</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b3">
	<analytic>
		<title level="a" type="main">Building Cyber-Security Systems of Information Networks Based on Intellectual Technologies</title>
		<author>
			<persName><forename type="first">S</forename><surname>Toliupa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">S</forename><surname>Nakonechny</surname></persName>
		</author>
		<author>
			<persName><forename type="first">N</forename><forename type="middle">N</forename><surname>Brailovskyi</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Scientific &amp; practical cyber security journal (SPCSJ) №1</title>
				<meeting><address><addrLine>Kharkiv,</addrLine></address></meeting>
		<imprint>
			<publisher>SMIT Company</publisher>
			<date type="published" when="2017">2017</date>
			<biblScope unit="page">620</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b4">
	<monogr>
		<author>
			<persName><forename type="first">William</forename><surname>Stallings</surname></persName>
		</author>
		<title level="m">Cryptography and Network Security Principles and Practices</title>
				<meeting><address><addrLine>New Jersey</addrLine></address></meeting>
		<imprint>
			<publisher>Prentice Hall</publisher>
			<date type="published" when="2005">2005</date>
		</imprint>
	</monogr>
	<note>4th ed</note>
</biblStruct>

<biblStruct xml:id="b5">
	<monogr>
		<ptr target="https://www.pvsm.ru/algoritmy/225093#begin" />
		<title level="m">Part one: Keyless CAs</title>
				<imprint/>
	</monogr>
	<note>60 cryptoalgorithms</note>
</biblStruct>

<biblStruct xml:id="b6">
	<analytic>
		<title level="a" type="main">Applied cryptography. Protocols, algorithms</title>
		<author>
			<persName><forename type="first">Bruce</forename><surname>Schneier</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">source texts in the C language</title>
				<meeting><address><addrLine>New Jersey</addrLine></address></meeting>
		<imprint>
			<publisher>Wiley</publisher>
			<date type="published" when="1995">1995</date>
		</imprint>
	</monogr>
	<note>20 th ed</note>
</biblStruct>

<biblStruct xml:id="b7">
	<monogr>
		<author>
			<persName><forename type="first">Joseph</forename><surname>Sterling</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Grah</forename></persName>
		</author>
		<title level="m">Hash Functions In Cryptography</title>
				<meeting><address><addrLine>Bergen, Norway</addrLine></address></meeting>
		<imprint>
			<date type="published" when="2008">2008</date>
		</imprint>
		<respStmt>
			<orgName>The University of Bergen</orgName>
		</respStmt>
	</monogr>
</biblStruct>

<biblStruct xml:id="b8">
	<monogr>
		<ptr target="https://www.binance.vision/security/what-is-symmetric-key-cryptography" />
		<title level="m">What Is Symmetric Key Cryptography?</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b9">
	<monogr>
		<author>
			<persName><forename type="first">Nigel</forename><surname>Smart</surname></persName>
		</author>
		<title level="m">Cryptography: An Introduction</title>
				<meeting><address><addrLine>New York City, NY</addrLine></address></meeting>
		<imprint>
			<publisher>Mcgraw-Hill College</publisher>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
	<note>3rd edition</note>
</biblStruct>

<biblStruct xml:id="b10">
	<monogr>
		<ptr target="https://en.wikipedia.org/wiki/Symmetric-key_algorithm" />
		<title level="m">Symmetric-key algorithm</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b11">
	<monogr>
		<title level="m" type="main">Understanding Cryptography</title>
		<author>
			<persName><forename type="first">Christof</forename><surname>Paar</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Jan</forename><surname>Pelzl</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2010">2010</date>
			<publisher>Springer-Verlag</publisher>
			<pubPlace>Berlin Heidelberg, Berlin</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b12">
	<monogr>
		<title level="m" type="main">AES Proposal</title>
		<author>
			<persName><forename type="first">Joan</forename><surname>Daemen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vincent</forename><surname>Rijmen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="1999">1999</date>
			<publisher>Rijndael</publisher>
			<pubPlace>Belgium</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b13">
	<monogr>
		<title level="m" type="main">The Design of Rijndael</title>
		<author>
			<persName><forename type="first">Joan</forename><surname>Daemen</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Vincent</forename><surname>Rijmen</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2001">2001</date>
			<publisher>Springer-Verlag</publisher>
			<pubPlace>Belgium</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b14">
	<monogr>
		<title level="m" type="main">Communication Theory of Secrecy Systems</title>
		<author>
			<persName><forename type="first">C</forename><forename type="middle">E</forename><surname>Shannon</surname></persName>
		</author>
		<idno type="DOI">10.1002/j.1538-7305.1949.tb00928.x</idno>
		<imprint>
			<date type="published" when="1949">1949</date>
			<publisher>Nokia Bell Labs</publisher>
			<biblScope unit="volume">28</biblScope>
			<pubPlace>New York, NY</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b15">
	<monogr>
		<ptr target="https://dic.academic.ru/dic.nsf/ruwiki/12112" />
		<title level="m">Kerkhoffs principle</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b16">
	<monogr>
		<title level="m" type="main">Cryptographic information protection</title>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">V</forename><surname>Yakovlev</surname></persName>
		</author>
		<author>
			<persName><forename type="first">A</forename><forename type="middle">A</forename><surname>Bezbogov</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">V</forename><surname>Rodin</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><forename type="middle">N</forename><surname>Shamkin</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2006">2006</date>
			<publisher>Tambov State Technical University Publishing House</publisher>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b17">
	<monogr>
		<ptr target="https://studref.com/403682/informatika/blochnye_shifry" />
		<title level="m">Block codes</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b18">
	<monogr>
		<title level="m" type="main">A Salad of Block Ciphers</title>
		<author>
			<persName><forename type="first">Roberto</forename><surname>Avanzi</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2017">2017</date>
			<pubPlace>Munich</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b19">
	<analytic>
		<title level="a" type="main">A self-study course in block-cipher cryptanalysis</title>
		<author>
			<persName><forename type="first">Bruce</forename><surname>Schneier</surname></persName>
		</author>
		<idno type="DOI">10.1080/0161-110091888754</idno>
		<ptr target="https://doi.org/10.1080/0161-110091888754" />
	</analytic>
	<monogr>
		<title level="j">Cryptologia</title>
		<imprint>
			<biblScope unit="volume">24</biblScope>
			<date type="published" when="2000">2000</date>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b20">
	<monogr>
		<ptr target="https://sites.google.com/site/anisimovkhv/learning/kripto/lecture/tema4" />
		<title level="m">Replacement codes</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b21">
	<monogr>
		<title level="m" type="main">The Block Cipher Companion</title>
		<author>
			<persName><forename type="first">Lars</forename><forename type="middle">R</forename><surname>Knudsenmatthew</surname></persName>
		</author>
		<author>
			<persName><forename type="first">J</forename><forename type="middle">B</forename><surname>Robshaw</surname></persName>
		</author>
		<imprint>
			<date type="published" when="2011">2011</date>
			<publisher>Springer-Verlag</publisher>
			<pubPlace>Berlin Heidelberg</pubPlace>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b22">
	<analytic>
		<title level="a" type="main">The method for re-ducing probability of incorrect data re-ception in radio channels of terahertz frequency range</title>
		<author>
			<persName><forename type="first">V</forename><surname>Saiko</surname></persName>
		</author>
		<author>
			<persName><forename type="first">S</forename><surname>Toliupa</surname></persName>
		</author>
		<author>
			<persName><forename type="first">V</forename><surname>Nakonechnyi</surname></persName>
		</author>
		<author>
			<persName><forename type="first">Dakov</forename><surname>Serhii</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">14th International Conference on Advanced Trends in Radioelecrtronics</title>
				<meeting><address><addrLine>TCSET)</addrLine></address></meeting>
		<imprint>
			<publisher>Telecommunications and Computer Engineering</publisher>
			<date type="published" when="2018">2018. 2018</date>
			<biblScope unit="page">174</biblScope>
		</imprint>
	</monogr>
</biblStruct>

<biblStruct xml:id="b23">
	<monogr>
		<ptr target="https://techspirited.com/how-does-wireless-keyboard-mouse-work" />
		<title level="m">How Does a Wireless Keyboard and Mouse Work?</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b24">
	<monogr>
		<ptr target="https://compfonyk.com/kak-rabotaet-besprovodnaya-klaviatura-dlya-kompyutera/" />
		<title level="m">work?</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b25">
	<monogr>
		<ptr target="https://habr.com/ru/post/390767/" />
		<title level="m">Mousejack Attack: Critical Vulnerability Found in Wireless Mice and Keyboards</title>
				<imprint/>
	</monogr>
</biblStruct>

<biblStruct xml:id="b26">
	<monogr>
		<ptr target="https://www.darkreading.com/endpoint/mousejack-attack-bites-non-bluetooth-wireless-mice/d/d-id/1324404" />
		<title level="m">Interception of data from wireless keyboards is now available to everyone</title>
				<imprint/>
	</monogr>
	<note>MouseJack&apos; Attack Bites Non-Bluetooth Wireless Mice</note>
</biblStruct>

<biblStruct xml:id="b27">
	<analytic>
		<title level="a" type="main">Hardware security keys</title>
		<author>
			<persName><forename type="first">D</forename><forename type="middle">V</forename><surname>Sklyarov</surname></persName>
		</author>
	</analytic>
	<monogr>
		<title level="m">Art of protection and information hacking</title>
				<meeting><address><addrLine>BHV-Petersburg</addrLine></address></meeting>
		<imprint>
			<publisher>SPb</publisher>
			<date type="published" when="2004">2004</date>
		</imprint>
	</monogr>
</biblStruct>

				</listBibl>
			</div>
		</back>
	</text>
</TEI>
