top of page

Keystroke Encryption

 

 

 

​

The Vulnerable Gap in Endpoint Security

​

EndpointLock™  protects your keystroke data by installing a secure encrypted keyboard that creates an alternate pathway to your apps, routing your encrypted data around the areas of vulnerability. For added security, the EndpointLock™ pathway is protected by a complex 256-bit encryption code

Keyloggers are a primary component of all malware and advanced persistent threats. They are a type of surveillance software that has the capability to record every keystroke an employee makes on their keyboard. Keyloggers are leveraged in the first stages of a breach to gain access credentials into the network of an organization. They are often installed on the endpoint’s device after a successful spear phishing attack when the victim clicks on an infected link or opens an attachment containing the malware. In addition, most keyloggers come with the ability to change their form (polymorphic) and go undetected as they quickly spread between the endpoints within the Enterprise. [1] The keylogger installs low in the OSI and captures the keystrokes as they pass through the stack on their way to the browser or application. See Figure 1 below, which depicts the vulnerable gap that exists in endpoint security. 

​

Solution: EndpointLock™ with Transport Layer Security (TLS™)
To mitigate input capture via keylogger, EndpointLock utilizes TLS (Transport Layer Security) to protect the transport of keystrokes from the point of data entry. While SSL and TLS begin strong cryptography at Layer 4 or, the Transport Layer within OSI, TLS begins strong cryptography from the kernel level at ring 0 and encrypts all keystrokes. The keystrokes travel on a 256bit encrypted pathway and are decrypted into the text box.

 

For optimum protection of corporate access credentials, keystroke encryption software should be installed on all connected desktop and mobile devices within an organization to help avert the advancement of a breach. See Figure 2 below.

  •  TLS takes control of the keyboard driver at the lowest layer in the kernel, Ring “0”

  • Protects keystroke data by creating an alternate AES 256 AES bit encrypted pathway, routing the data around the area of vulnerability

  • Create Encrypted Keystroke packet per keystroke

  • Create Decrypt packet per keystroke for Encrypted Keystroke

  • Send Decrypt packet into text box requesting stroke and then deliver encrypted keystroke and decrypt keystroke directly into application

​

cromteccyberusecases2.PNG
cromtecprotectionsfullimage.PNG
bottom of page