CN105069334A - Character range redefinition based password recovery method - Google Patents
Character range redefinition based password recovery method Download PDFInfo
- Publication number
- CN105069334A CN105069334A CN201510523913.6A CN201510523913A CN105069334A CN 105069334 A CN105069334 A CN 105069334A CN 201510523913 A CN201510523913 A CN 201510523913A CN 105069334 A CN105069334 A CN 105069334A
- Authority
- CN
- China
- Prior art keywords
- password
- character
- range
- recovery method
- character range
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Pending
Links
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2131—Lost password, e.g. recovery of lost or forgotten passwords
Landscapes
- Engineering & Computer Science (AREA)
- Computer Security & Cryptography (AREA)
- Theoretical Computer Science (AREA)
- Computer Hardware Design (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Organic Low-Molecular-Weight Compounds And Preparation Thereof (AREA)
Abstract
The invention provides a character range redefinition based password recovery method used for recovering a password in character ranges corresponding to one or more character positions in the known password. The method comprises: step 1, identifying the character range corresponding to each character position of an unknown character range in the password; step 2, identifying the character range corresponding to each character position of a known character range in the password; step 3, selecting one of the character ranges corresponding to the character positions in the password according to a predetermined sequence to generate a password character string; and step 4, inputting the password character string into a password matching module for comparison with a pre-stored password, and when the password character string is the same as the password, ending the recovery of the password, or otherwise, returning to perform the step 3. According to the method, the traversing range of the characters in the password is redefined for realizing intelligent bit slicing processing of the password, so that the password recovery complexity is lowered and the password recovery rate is increased.
Description
Technical field
The present invention relates to a kind of password recovery method, particularly relate to a kind of password recovery method redefined based on character range.
Background technology
Along with personal computer is used widely, be protection sensitive information, password becomes important all the more, and it is protected by the data that limiting access computing machine and its store.When user forgets their password or password is unavailable when this information accessed by needs, problem has occurred.Password recovery (or " password cracking ") is the process determining unknown password.
Traditional violence traversal is method the most basic in password cracking technology, also makes password exhaustive, be exactly by letter or number according to exhaustive generate rule password character string, carry out traversal trial.If be aware of account number in advance, as mail account, QQ user account number, Web bank's account etc., and that the password of user is arranged is very simple, then the crack tool that uses force can crack password soon.Such as one four and all form its password by numeral and have 10000 kinds of combinations, that is we can attempt 10000 times and just can find real password at most.We can use computing machine to come to calculate one by one to profit in this way, and that is cracking any one password with us is also all a matter of time.
But, traditional password recovery method has a lot of limitation, such as, in password, the traversal scope of each character is all identical character range (comprising lowercase, capitalization and digital 0-9), often needs more rule to cover password scope large as far as possible to improve the success ratio of password recovery.That is, common violence ergodic algorithm, the character can only brought in all character range carries out fully intermeshing combination, and algorithm complex is high.When cracking the password within 8, all cannot complete traversal at short notice, comparatively complicated password is then difficult to crack out.
Summary of the invention
For above-mentioned the deficiencies in the prior art, the invention provides a kind of password recovery method redefined based on character traversal scope, with by redefining the traversal scope of character in password, realize dividing position to process to the intelligence of password, thus reduce password recovery complexity, and improve password recovery speed.
To achieve these goals, the present invention adopts following technical scheme:
Based on the password recovery method that character range redefines, recover described password for during character range that the one or more character positions in known password are corresponding, comprise the following steps:
Step one, identifies the character range corresponding to each character position of character range the unknown in described password, comprises lowercase, capitalization and digital 0-9;
Step 2, identifies the character range corresponding to each character position that character range in described password is known;
Step 3, selects one to generate a password character string according to each in the character range of predefined procedure from described password corresponding to each character position; And
Step 4, described password character string inputed to compare with the described password wherein prestored in a password matching module, when described password character string is consistent with described password, password recovery terminates, otherwise, return and perform described step 3.
Further, the character range corresponding to each character position that in described password, character range is known comprises the one in lowercase, capitalization, digital 0-9, lowercase and uppercase combination, lowercase and the combination of digital 0-9 and the combination of capitalization and digital 0-9.
Further, described password match module is login interface.
Preferably, described predefined procedure refers to that first alphabet sequence selects lowercase, then alphabet sequence selects capitalization, finally presses from little to large select progressively numeral 0-9.
Further, described password recovery method realizes based on FPGA.
In sum, when the character range that the one or more character positions in known password are corresponding be lowercase (a-z), capitalization (A-Z) or numeral (0-9) or when selecting between two, the traversal character range of this character position is reduced into corresponding lowercase (a-z), capitalization (A-Z) or numeral (0-9) or their selection between two by the present invention, algorithm complex will reduce greatly, and password recovery speed will improve.
Accompanying drawing explanation
Fig. 1 is the process flow diagram of the password recovery method redefined based on character range.
Embodiment
For making to understand technological means of the present invention and feature further in depth, careful cooperation accompanying drawing gives citing again and illustrates in rear further:
Generally speaking, the character range complete or collected works of password are S: comprise lowercase (a ~ z), capitalization (A ~ Z) and numeral (0 ~ 9).When user fails to remember password, can by recovering to rise the access cracking this password to obtain to protected material.
The complexity of password recovery depends on character range corresponding to the size (that is, the quantity of position) of the password that will recover and each position.If password length is n, by conventional password restoration methods, then carry out exhaustive to this n position password, namely, each traversal scope of this n-bit character is all S, and exhaustive order is all 26 lowercases (a ~ z), 26 capitalizations (A ~ Z), 10 numerals (0 ~ 9).Therefore each all needs exhaustive 62 characters, then these characters is combined to form to the password of n figure place, then, total password number of generation is 62
nindividual, algorithm complex is O (62
n).
Fig. 1 shows the present invention, that is, the process flow diagram of the password recovery method redefined based on character range.Suppose the character range that one or more character positions in known password are corresponding, then method of the present invention comprises the steps:
First, the character range corresponding to each character position of character range the unknown in mark password, this character range is complete or collected works S, that is, comprise lowercase, capitalization and digital 0-9.
Secondly, the character range corresponding to each character position that in mark password, character range is known, such as, this character range can be the one in lowercase, capitalization, digital 0-9, lowercase and uppercase combination, lowercase and the combination of digital 0-9 and the combination of capitalization and digital 0-9.
Then, a password character string is generated according to selecting one in the character range of predefined procedure from password corresponding to each character position, this predefined procedure is generally first alphabet sequence and selects lowercase, alphabet sequence selects capitalization again, finally by from little to large select progressively numeral 0-9, skip when character range lacks a certain item in lowercase, capitalization and numeral.
Finally, password character string inputed to compare with the password wherein prestored in a password matching module (as login interface), when password character string is consistent with password, password recovery terminates, otherwise, return execution step 3.
Method of the present invention is explained below with two instantiations:
Example 1, for 6 bit length password CPU123.Suppose that known password front three character is CPU, and known latter three is all numeral, then recover rear three characters and can recover this password.
If by conventional password restoration methods, need carry out exhaustive to rear three characters, each traversal scope of these three characters is all S, and exhaustive order is all 26 lowercases (a ~ z), 26 capitalizations (A ~ Z), 10 numerals (0 ~ 9).Therefore each all needs exhaustive 62 characters, then is combined to form three-figure password to these characters, then, total password number of generation is 62*62*62=238328, and algorithm complex is O (62
3).
Adopt of the present invention based on character traversal scope redefine password recovery method time, because known latter three is all numeral, then can arrange traversal character range is N: numeral (0-9), and namely each traversal scope of three characters is all N, and exhaustive order is all 0 ~ 9.Therefore each all needs exhaustive 10 characters, then is combined to form three-figure password character string to these characters, then, total password number of generation is 10*10*10=1000, and algorithm complex is O (10
3).
In this example, method of the present invention comparatively conventional password generation method generates 238328-1000=237328 password less.
Example 2, for 6 passwords, supposes that old password is Qy5Bk3.Known password is 6 figure places, and first is capitalization, and last position is numeral, and all the other character range of 4 are unknown.
If by conventional password restoration methods, then carry out exhaustive to these 6 passwords.Each traversal scope of these 6 characters is all S, and exhaustive order is all 26 lowercases (a ~ z), 2 capitalizations (A ~ Z), 10 numerals (0 ~ 9).Therefore each all needs exhaustive 62 characters, then these characters is combined to form to the password of 6 figure places, then, total password number of generation is 62*62*62*62*62*62=56800235584, and algorithm complex is O (62
6).
When adopting the password recovery method redefined based on character traversal scope of the present invention, because known first be capitalization, last position is digital, and all the other 4 belong to unknown character.The traversal character range that then can arrange first character is D:26 capitalization (A ~ Z), needs exhaustive 26 characters; Four, centre is due to unknown character scope, can arrange each traversal scope of these four characters is all S, exhaustive order is all 26 lowercases (a ~ z), 26 capitalizations (A ~ Z), 10 numerals (0 ~ 9), therefore these four characters each all need exhaustive 62 characters; Last traversal scope is N:0 ~ 9, needs exhaustive 10 characters.Therefore each all to need to carry out character according to respective character range exhaustive, again these characters are combined to form to the password of 6 figure places, then, total password number of generation is 26*62*62*62*62*10=3841847360, and algorithm complex is O (26*62*62*62*62*10).
In this example, method of the present invention comparatively conventional password generation method generates 56800235584-3841847360=52958388224 password less.Should be appreciated that, the present invention can realize based on FPGA.
As can be seen here, method of the present invention can reduce password generated unnecessary in a large number, can save the overall time of password recovery, raise the efficiency.
Above-described, be only preferred embodiment of the present invention, be not intended to limit scope of the present invention, the above embodiment of the present invention can also make a variety of changes.Namely every claims according to the present patent application and description are done simple, equivalence change and modify, and all fall into the claims of patent of the present invention.The not detailed description of the present invention be routine techniques content.
Claims (5)
1., based on the password recovery method that character range redefines, recover described password for during character range that the one or more character positions in known password are corresponding, it is characterized in that, comprise the following steps:
Step one, identifies the character range corresponding to each character position of character range the unknown in described password, comprises lowercase, capitalization and digital 0-9;
Step 2, identifies the character range corresponding to each character position that character range in described password is known;
Step 3, selects one to generate a password character string according to each in the character range of predefined procedure from described password corresponding to each character position; And
Step 4, described password character string inputed to compare with the described password wherein prestored in a password matching module, when described password character string is consistent with described password, password recovery terminates, otherwise, return and perform described step 3.
2. the password recovery method redefined based on character traversal scope according to claim 1, it is characterized in that, the character range corresponding to each character position that in described password, character range is known comprises the one in lowercase, capitalization, digital 0-9, lowercase and uppercase combination, lowercase and the combination of digital 0-9 and the combination of capitalization and digital 0-9.
3. the password recovery method redefined based on character traversal scope according to claim 1, it is characterized in that, described password match module is login interface.
4. the password recovery method redefined based on character traversal scope according to claim 1, it is characterized in that, described predefined procedure refers to that first alphabet sequence selects lowercase, then alphabet sequence selects capitalization, finally presses from little to large select progressively numeral 0-9.
5. the password recovery method redefined based on character traversal scope according to claim 1, it is characterized in that, described password recovery method realizes based on FPGA.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510523913.6A CN105069334A (en) | 2015-08-24 | 2015-08-24 | Character range redefinition based password recovery method |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201510523913.6A CN105069334A (en) | 2015-08-24 | 2015-08-24 | Character range redefinition based password recovery method |
Publications (1)
Publication Number | Publication Date |
---|---|
CN105069334A true CN105069334A (en) | 2015-11-18 |
Family
ID=54498697
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201510523913.6A Pending CN105069334A (en) | 2015-08-24 | 2015-08-24 | Character range redefinition based password recovery method |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN105069334A (en) |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109344633A (en) * | 2018-09-28 | 2019-02-15 | 山东超越数控电子股份有限公司 | A kind of software decryption method based on mixed logic processor platform |
CN110311777A (en) * | 2019-07-03 | 2019-10-08 | 华中农业大学 | A kind of random password generation method and system based on the displacement of a kind of cryptography |
Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1694394A (en) * | 2005-04-14 | 2005-11-09 | 上海交通大学 | Deciphering method for file password |
-
2015
- 2015-08-24 CN CN201510523913.6A patent/CN105069334A/en active Pending
Patent Citations (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1694394A (en) * | 2005-04-14 | 2005-11-09 | 上海交通大学 | Deciphering method for file password |
Non-Patent Citations (1)
Title |
---|
刘功申: "基于真实数据挖掘的口令脆弱性评估及恢复", 《计算机学报》 * |
Cited By (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN109344633A (en) * | 2018-09-28 | 2019-02-15 | 山东超越数控电子股份有限公司 | A kind of software decryption method based on mixed logic processor platform |
CN110311777A (en) * | 2019-07-03 | 2019-10-08 | 华中农业大学 | A kind of random password generation method and system based on the displacement of a kind of cryptography |
CN110311777B (en) * | 2019-07-03 | 2021-08-31 | 华中农业大学 | Random password generation method and system based on one-class cryptography permutation |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US20120268393A1 (en) | System and Method for Secure Data Entry | |
CN103679012A (en) | Clustering method and device of portable execute (PE) files | |
CN103677644A (en) | Unlocking method and system for smart mobile terminal | |
CN109450845A (en) | A kind of algorithm generation malice domain name detection method based on deep neural network | |
CN103428307A (en) | Method and equipment for detecting counterfeit domain names | |
CN111399848B (en) | Hard-coded data detection method and device, electronic equipment and medium | |
CN107102998A (en) | A kind of String distance computational methods and device | |
CN107958154A (en) | A kind of malware detection device and method | |
CN110362995A (en) | It is a kind of based on inversely with the malware detection of machine learning and analysis system | |
CN108280197A (en) | A kind of method and system of the homologous binary file of identification | |
CN110110518A (en) | Password strength assessment method, apparatus and computer readable storage medium | |
CN105069334A (en) | Character range redefinition based password recovery method | |
Chou et al. | Password cracking based on special keyboard patterns | |
CN104112096B (en) | Multi-point touch method and device | |
CN106293354B (en) | Shortcut menu self-adaptive display control method, server and portable terminal | |
EP2966552A1 (en) | Apparatus and method for providing feedback on input data | |
CN107239500A (en) | A kind of character string matching method and system | |
US20230154077A1 (en) | Training method for character generation model, character generation method, apparatus and storage medium | |
CN110222507A (en) | A kind of Malware big data intelligence learning recognition methods based on fuzzy Hash | |
CN104866631A (en) | Method and device for aggregating counseling problems | |
CN114598443A (en) | Malicious software detector training method, detector, electronic device and storage medium | |
CN103714294A (en) | Data overwriting method | |
CN106657016A (en) | Illegal user name recognition method and system | |
CN110278066A (en) | A kind of encryption and decryption method of Chinese character string | |
CN109617653A (en) | The optimization implementation method of sequential test |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
WD01 | Invention patent application deemed withdrawn after publication |
Application publication date: 20151118 |
|
WD01 | Invention patent application deemed withdrawn after publication |