It has been publicly known that keyboards and mice, either wired or wireless, can be potentially attacked by eavesdropping or hijacking. Although there are many secure keyboards and some secure mice in the market, there are still vulnerabilities under different types of Man-In-The-Middle (MITM) attacks such as hijack or replay. Usually these attacks are low cost and easy to implement, but so fa...