University of Bahrain
Scientific Journals

Keyboard Encryption Algorithm Based on Software Engineering Security

Show simple item record

dc.contributor.author Croock, Muayad Sadik
dc.date.accessioned 2022-03-09T12:09:07Z
dc.date.available 2022-03-09T12:09:07Z
dc.date.issued 2022-03-09
dc.identifier.issn 2210-142X
dc.identifier.uri https://journal.uob.edu.bh:443/handle/123456789/4603
dc.description.abstract It is well known that nowadays the security issues in the information system are increased in noticed way. These issues include the hardware and software sides, in terms of data or information as well as the devices. One of the most important parts that can be used to tackle these issues is the keyboard. The attacks on the keyboard, such as key stroke and key logging, need to be tackled. In this paper, an encryption algorithm for keyboard is proposed to guarantee the security in the output keyboard from attackers. The proposed algorithm is built based on software engineering model in terms of structure and formulation. This is to increase the flexibility of development, scalability to involve more number of users (keyboards), and reliability of employing in real-time system due to its light and efficiency. The proposed algorithm uses the interleaving and XOR processes in encryption, where the interleaver uses random seeds in generating specific indexing orders. It is tested among numerous case studies including the randomness of the generated indexing orders that are passed through different tests. The efficiency of the proposed algorithm is tested over many experiments to result more than 98%. Moreover, the consumed time for encryption and decryption processes is checked as well to obtain that the decryption process takes less time. en_US
dc.language.iso en en_US
dc.publisher University of Bahrain en_US
dc.subject Software Engineering en_US
dc.subject Encryption en_US
dc.subject Interleaving, security en_US
dc.subject Keyboard structure en_US
dc.title Keyboard Encryption Algorithm Based on Software Engineering Security en_US
dc.identifier.doi https://dx.doi.org/10.12785/ijcds/1101106
dc.volume 11 en_US
dc.issue 1 en_US
dc.pagestart 1309 en_US
dc.pageend 1317 en_US
dc.contributor.authoraffiliation Control and Systems Engineering, University of Technology-Iraq, Baghdad, Iraq en_US
dc.source.title International Journal of Computing and Digital Systems en_US
dc.abbreviatedsourcetitle IJCDS en_US


Files in this item

This item appears in the following Issue(s)

Show simple item record

All Journals


Advanced Search

Browse

Administrator Account