Site Options:

Kadix

Keylogging Ontology

Keystroke Encryption

Keystroke Encryption prevents keylogging by encrypting keystrokes upon entry, before they are processed by an application or browser. The encryption ensures that keylogging malware records only random characters that are of no practical use. Strong methodology is required to prevent keylogging software from capturing keystrokes before they are encrypted.

How Keystrokes are Encrypted

Keystroke encryption takes place in two stages:

Encryption Process
Keystroke encryption occurs at a low level within the operating system kernel of the computer, after each keystroke is entered but before the entry is sent to the application or browser.

Decryption Process
Once the encrypted keystrokes reach the application or browser, they are decrypted with an encryption key.

Important: Related Concept: Encryption Key, is the main encryption topic in this documentation.

Related Information:
Keylogging Ontology
Problem & Solution
MobileTrust: FAQs

Related Concepts:
Encryption
Encryption Key