CN105069334A - Character range redefinition based password recovery method - Google Patents

Character range redefinition based password recovery method Download PDF

Info

Publication number
CN105069334A
CN105069334A CN201510523913.6A CN201510523913A CN105069334A CN 105069334 A CN105069334 A CN 105069334A CN 201510523913 A CN201510523913 A CN 201510523913A CN 105069334 A CN105069334 A CN 105069334A
Authority
CN
China
Prior art keywords
password
character
range
recovery method
character range
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201510523913.6A
Other languages
Chinese (zh)
Inventor
夏霙
斯雪明
李翔
吴中明
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
WUXI TONGWEI TECHNOLOGY Co Ltd
SHANGHAI INSTITUTE OF DATA ANALYSIS AND PROCESSING TECHNOLOGY
Shanghai Redneurons Co Ltd
Original Assignee
WUXI TONGWEI TECHNOLOGY Co Ltd
SHANGHAI INSTITUTE OF DATA ANALYSIS AND PROCESSING TECHNOLOGY
Shanghai Redneurons Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by WUXI TONGWEI TECHNOLOGY Co Ltd, SHANGHAI INSTITUTE OF DATA ANALYSIS AND PROCESSING TECHNOLOGY, Shanghai Redneurons Co Ltd filed Critical WUXI TONGWEI TECHNOLOGY Co Ltd
Priority to CN201510523913.6A priority Critical patent/CN105069334A/en
Publication of CN105069334A publication Critical patent/CN105069334A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F2221/00Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/21Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F2221/2131Lost password, e.g. recovery of lost or forgotten passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Organic Low-Molecular-Weight Compounds And Preparation Thereof (AREA)

Abstract

The invention provides a character range redefinition based password recovery method used for recovering a password in character ranges corresponding to one or more character positions in the known password. The method comprises: step 1, identifying the character range corresponding to each character position of an unknown character range in the password; step 2, identifying the character range corresponding to each character position of a known character range in the password; step 3, selecting one of the character ranges corresponding to the character positions in the password according to a predetermined sequence to generate a password character string; and step 4, inputting the password character string into a password matching module for comparison with a pre-stored password, and when the password character string is the same as the password, ending the recovery of the password, or otherwise, returning to perform the step 3. According to the method, the traversing range of the characters in the password is redefined for realizing intelligent bit slicing processing of the password, so that the password recovery complexity is lowered and the password recovery rate is increased.

Description

A kind of password recovery method redefined based on character range
Technical field
The present invention relates to a kind of password recovery method, particularly relate to a kind of password recovery method redefined based on character range.
Background technology
Along with personal computer is used widely, be protection sensitive information, password becomes important all the more, and it is protected by the data that limiting access computing machine and its store.When user forgets their password or password is unavailable when this information accessed by needs, problem has occurred.Password recovery (or " password cracking ") is the process determining unknown password.
Traditional violence traversal is method the most basic in password cracking technology, also makes password exhaustive, be exactly by letter or number according to exhaustive generate rule password character string, carry out traversal trial.If be aware of account number in advance, as mail account, QQ user account number, Web bank's account etc., and that the password of user is arranged is very simple, then the crack tool that uses force can crack password soon.Such as one four and all form its password by numeral and have 10000 kinds of combinations, that is we can attempt 10000 times and just can find real password at most.We can use computing machine to come to calculate one by one to profit in this way, and that is cracking any one password with us is also all a matter of time.
But, traditional password recovery method has a lot of limitation, such as, in password, the traversal scope of each character is all identical character range (comprising lowercase, capitalization and digital 0-9), often needs more rule to cover password scope large as far as possible to improve the success ratio of password recovery.That is, common violence ergodic algorithm, the character can only brought in all character range carries out fully intermeshing combination, and algorithm complex is high.When cracking the password within 8, all cannot complete traversal at short notice, comparatively complicated password is then difficult to crack out.
Summary of the invention
For above-mentioned the deficiencies in the prior art, the invention provides a kind of password recovery method redefined based on character traversal scope, with by redefining the traversal scope of character in password, realize dividing position to process to the intelligence of password, thus reduce password recovery complexity, and improve password recovery speed.
To achieve these goals, the present invention adopts following technical scheme:
Based on the password recovery method that character range redefines, recover described password for during character range that the one or more character positions in known password are corresponding, comprise the following steps:
Step one, identifies the character range corresponding to each character position of character range the unknown in described password, comprises lowercase, capitalization and digital 0-9;
Step 2, identifies the character range corresponding to each character position that character range in described password is known;
Step 3, selects one to generate a password character string according to each in the character range of predefined procedure from described password corresponding to each character position; And
Step 4, described password character string inputed to compare with the described password wherein prestored in a password matching module, when described password character string is consistent with described password, password recovery terminates, otherwise, return and perform described step 3.
Further, the character range corresponding to each character position that in described password, character range is known comprises the one in lowercase, capitalization, digital 0-9, lowercase and uppercase combination, lowercase and the combination of digital 0-9 and the combination of capitalization and digital 0-9.
Further, described password match module is login interface.
Preferably, described predefined procedure refers to that first alphabet sequence selects lowercase, then alphabet sequence selects capitalization, finally presses from little to large select progressively numeral 0-9.
Further, described password recovery method realizes based on FPGA.
In sum, when the character range that the one or more character positions in known password are corresponding be lowercase (a-z), capitalization (A-Z) or numeral (0-9) or when selecting between two, the traversal character range of this character position is reduced into corresponding lowercase (a-z), capitalization (A-Z) or numeral (0-9) or their selection between two by the present invention, algorithm complex will reduce greatly, and password recovery speed will improve.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the password recovery method redefined based on character range.
Embodiment
For making to understand technological means of the present invention and feature further in depth, careful cooperation accompanying drawing gives citing again and illustrates in rear further:
Generally speaking, the character range complete or collected works of password are S: comprise lowercase (a ~ z), capitalization (A ~ Z) and numeral (0 ~ 9).When user fails to remember password, can by recovering to rise the access cracking this password to obtain to protected material.
The complexity of password recovery depends on character range corresponding to the size (that is, the quantity of position) of the password that will recover and each position.If password length is n, by conventional password restoration methods, then carry out exhaustive to this n position password, namely, each traversal scope of this n-bit character is all S, and exhaustive order is all 26 lowercases (a ~ z), 26 capitalizations (A ~ Z), 10 numerals (0 ~ 9).Therefore each all needs exhaustive 62 characters, then these characters is combined to form to the password of n figure place, then, total password number of generation is 62 nindividual, algorithm complex is O (62 n).
Fig. 1 shows the present invention, that is, the process flow diagram of the password recovery method redefined based on character range.Suppose the character range that one or more character positions in known password are corresponding, then method of the present invention comprises the steps:
First, the character range corresponding to each character position of character range the unknown in mark password, this character range is complete or collected works S, that is, comprise lowercase, capitalization and digital 0-9.
Secondly, the character range corresponding to each character position that in mark password, character range is known, such as, this character range can be the one in lowercase, capitalization, digital 0-9, lowercase and uppercase combination, lowercase and the combination of digital 0-9 and the combination of capitalization and digital 0-9.
Then, a password character string is generated according to selecting one in the character range of predefined procedure from password corresponding to each character position, this predefined procedure is generally first alphabet sequence and selects lowercase, alphabet sequence selects capitalization again, finally by from little to large select progressively numeral 0-9, skip when character range lacks a certain item in lowercase, capitalization and numeral.
Finally, password character string inputed to compare with the password wherein prestored in a password matching module (as login interface), when password character string is consistent with password, password recovery terminates, otherwise, return execution step 3.
Method of the present invention is explained below with two instantiations:
Example 1, for 6 bit length password CPU123.Suppose that known password front three character is CPU, and known latter three is all numeral, then recover rear three characters and can recover this password.
If by conventional password restoration methods, need carry out exhaustive to rear three characters, each traversal scope of these three characters is all S, and exhaustive order is all 26 lowercases (a ~ z), 26 capitalizations (A ~ Z), 10 numerals (0 ~ 9).Therefore each all needs exhaustive 62 characters, then is combined to form three-figure password to these characters, then, total password number of generation is 62*62*62=238328, and algorithm complex is O (62 3).
Adopt of the present invention based on character traversal scope redefine password recovery method time, because known latter three is all numeral, then can arrange traversal character range is N: numeral (0-9), and namely each traversal scope of three characters is all N, and exhaustive order is all 0 ~ 9.Therefore each all needs exhaustive 10 characters, then is combined to form three-figure password character string to these characters, then, total password number of generation is 10*10*10=1000, and algorithm complex is O (10 3).
In this example, method of the present invention comparatively conventional password generation method generates 238328-1000=237328 password less.
Example 2, for 6 passwords, supposes that old password is Qy5Bk3.Known password is 6 figure places, and first is capitalization, and last position is numeral, and all the other character range of 4 are unknown.
If by conventional password restoration methods, then carry out exhaustive to these 6 passwords.Each traversal scope of these 6 characters is all S, and exhaustive order is all 26 lowercases (a ~ z), 2 capitalizations (A ~ Z), 10 numerals (0 ~ 9).Therefore each all needs exhaustive 62 characters, then these characters is combined to form to the password of 6 figure places, then, total password number of generation is 62*62*62*62*62*62=56800235584, and algorithm complex is O (62 6).
When adopting the password recovery method redefined based on character traversal scope of the present invention, because known first be capitalization, last position is digital, and all the other 4 belong to unknown character.The traversal character range that then can arrange first character is D:26 capitalization (A ~ Z), needs exhaustive 26 characters; Four, centre is due to unknown character scope, can arrange each traversal scope of these four characters is all S, exhaustive order is all 26 lowercases (a ~ z), 26 capitalizations (A ~ Z), 10 numerals (0 ~ 9), therefore these four characters each all need exhaustive 62 characters; Last traversal scope is N:0 ~ 9, needs exhaustive 10 characters.Therefore each all to need to carry out character according to respective character range exhaustive, again these characters are combined to form to the password of 6 figure places, then, total password number of generation is 26*62*62*62*62*10=3841847360, and algorithm complex is O (26*62*62*62*62*10).
In this example, method of the present invention comparatively conventional password generation method generates 56800235584-3841847360=52958388224 password less.Should be appreciated that, the present invention can realize based on FPGA.
As can be seen here, method of the present invention can reduce password generated unnecessary in a large number, can save the overall time of password recovery, raise the efficiency.
Above-described, be only preferred embodiment of the present invention, be not intended to limit scope of the present invention, the above embodiment of the present invention can also make a variety of changes.Namely every claims according to the present patent application and description are done simple, equivalence change and modify, and all fall into the claims of patent of the present invention.The not detailed description of the present invention be routine techniques content.

Claims (5)

1., based on the password recovery method that character range redefines, recover described password for during character range that the one or more character positions in known password are corresponding, it is characterized in that, comprise the following steps:
Step one, identifies the character range corresponding to each character position of character range the unknown in described password, comprises lowercase, capitalization and digital 0-9;
Step 2, identifies the character range corresponding to each character position that character range in described password is known;
Step 3, selects one to generate a password character string according to each in the character range of predefined procedure from described password corresponding to each character position; And
Step 4, described password character string inputed to compare with the described password wherein prestored in a password matching module, when described password character string is consistent with described password, password recovery terminates, otherwise, return and perform described step 3.
2. the password recovery method redefined based on character traversal scope according to claim 1, it is characterized in that, the character range corresponding to each character position that in described password, character range is known comprises the one in lowercase, capitalization, digital 0-9, lowercase and uppercase combination, lowercase and the combination of digital 0-9 and the combination of capitalization and digital 0-9.
3. the password recovery method redefined based on character traversal scope according to claim 1, it is characterized in that, described password match module is login interface.
4. the password recovery method redefined based on character traversal scope according to claim 1, it is characterized in that, described predefined procedure refers to that first alphabet sequence selects lowercase, then alphabet sequence selects capitalization, finally presses from little to large select progressively numeral 0-9.
5. the password recovery method redefined based on character traversal scope according to claim 1, it is characterized in that, described password recovery method realizes based on FPGA.
CN201510523913.6A 2015-08-24 2015-08-24 Character range redefinition based password recovery method Pending CN105069334A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201510523913.6A CN105069334A (en) 2015-08-24 2015-08-24 Character range redefinition based password recovery method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201510523913.6A CN105069334A (en) 2015-08-24 2015-08-24 Character range redefinition based password recovery method

Publications (1)

Publication Number Publication Date
CN105069334A true CN105069334A (en) 2015-11-18

Family

ID=54498697

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201510523913.6A Pending CN105069334A (en) 2015-08-24 2015-08-24 Character range redefinition based password recovery method

Country Status (1)

Country Link
CN (1) CN105069334A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109344633A (en) * 2018-09-28 2019-02-15 山东超越数控电子股份有限公司 A kind of software decryption method based on mixed logic processor platform
CN110311777A (en) * 2019-07-03 2019-10-08 华中农业大学 A kind of random password generation method and system based on the displacement of a kind of cryptography

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1694394A (en) * 2005-04-14 2005-11-09 上海交通大学 Deciphering method for file password

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN1694394A (en) * 2005-04-14 2005-11-09 上海交通大学 Deciphering method for file password

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
刘功申: "基于真实数据挖掘的口令脆弱性评估及恢复", 《计算机学报》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109344633A (en) * 2018-09-28 2019-02-15 山东超越数控电子股份有限公司 A kind of software decryption method based on mixed logic processor platform
CN110311777A (en) * 2019-07-03 2019-10-08 华中农业大学 A kind of random password generation method and system based on the displacement of a kind of cryptography
CN110311777B (en) * 2019-07-03 2021-08-31 华中农业大学 Random password generation method and system based on one-class cryptography permutation

Similar Documents

Publication Publication Date Title
US20120268393A1 (en) System and Method for Secure Data Entry
CN103679012A (en) Clustering method and device of portable execute (PE) files
CN103677644A (en) Unlocking method and system for smart mobile terminal
CN109450845A (en) A kind of algorithm generation malice domain name detection method based on deep neural network
CN103428307A (en) Method and equipment for detecting counterfeit domain names
CN111399848B (en) Hard-coded data detection method and device, electronic equipment and medium
CN107102998A (en) A kind of String distance computational methods and device
CN107958154A (en) A kind of malware detection device and method
CN110362995A (en) It is a kind of based on inversely with the malware detection of machine learning and analysis system
CN108280197A (en) A kind of method and system of the homologous binary file of identification
CN110110518A (en) Password strength assessment method, apparatus and computer readable storage medium
CN105069334A (en) Character range redefinition based password recovery method
Chou et al. Password cracking based on special keyboard patterns
CN104112096B (en) Multi-point touch method and device
CN106293354B (en) Shortcut menu self-adaptive display control method, server and portable terminal
EP2966552A1 (en) Apparatus and method for providing feedback on input data
CN107239500A (en) A kind of character string matching method and system
US20230154077A1 (en) Training method for character generation model, character generation method, apparatus and storage medium
CN110222507A (en) A kind of Malware big data intelligence learning recognition methods based on fuzzy Hash
CN104866631A (en) Method and device for aggregating counseling problems
CN114598443A (en) Malicious software detector training method, detector, electronic device and storage medium
CN103714294A (en) Data overwriting method
CN106657016A (en) Illegal user name recognition method and system
CN110278066A (en) A kind of encryption and decryption method of Chinese character string
CN109617653A (en) The optimization implementation method of sequential test

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
WD01 Invention patent application deemed withdrawn after publication

Application publication date: 20151118

WD01 Invention patent application deemed withdrawn after publication