CN105933120A - Spark platform-based password hash value recovery method and device - Google Patents

Spark platform-based password hash value recovery method and device Download PDF

Info

Publication number
CN105933120A
CN105933120A CN201610211597.3A CN201610211597A CN105933120A CN 105933120 A CN105933120 A CN 105933120A CN 201610211597 A CN201610211597 A CN 201610211597A CN 105933120 A CN105933120 A CN 105933120A
Authority
CN
China
Prior art keywords
chain
rainbow
function
ciphertext
joint
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201610211597.3A
Other languages
Chinese (zh)
Inventor
覃征
李志鹏
黄凯
叶树雄
杨晓
张任伟
徐凯平
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Tsinghua University
Original Assignee
Tsinghua University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Tsinghua University filed Critical Tsinghua University
Priority to CN201610211597.3A priority Critical patent/CN105933120A/en
Publication of CN105933120A publication Critical patent/CN105933120A/en
Pending legal-status Critical Current

Links

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/32Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials
    • H04L9/3236Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols including means for verifying the identity or authority of a user of the system or for message authentication, e.g. authorization, entity authentication, data integrity or data verification, non-repudiation, key authentication or verification of credentials using cryptographic hash functions
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols
    • H04L9/08Key distribution or management, e.g. generation, sharing or updating, of cryptographic keys or passwords
    • H04L9/0894Escrow, recovery or storing of secret information, e.g. secret key escrow or cryptographic key storage
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/60Digital content management, e.g. content distribution

Abstract

The invention discloses a Spark platform-based password hash value recovery method and device. The design method includes a rainbow table data generation step and a rainbow table decryption step. According to the method, the first-of-chain node value of each rainbow chain is recorded as an SV (Start Value), and the last-of-chain node value of each rainbow chain is recorded as an EV (End Value); based on the processing capability of the Spark platform for large-scale data, a map function is utilized to effectively calculate EV corresponding to SV, so that rainbow chains can be generated, and are stored in an HDFS (Hadoop distributed file system), and rainbow table data generation is completed; and a filter function is utilized to find all SV corresponding to a ciphertext to be decrypted, and a foreach function is called to generate complete rainbow chains according to each SV, and the ciphertext can be decrypted.

Description

A kind of password cryptographic Hash restoration methods based on Spark platform and device
Technical field
The invention belongs to technical field of network information safety and the password backward recovery technical field in cryptography, Particularly to a kind of password cryptographic Hash restoration methods based on Spark platform and device.
Background technology
In order to ensure in data information security attribute can not tamper, the most password is not carried out in plain text straight Connect storage, but the cryptographic Hash that the password through Hash operation is the most corresponding is stored.Hash algorithm, Also known as hashing algorithm, crypto module is waited to input to be converted into by the plaintext of random length and consolidate by displacement and obscuring The cryptographic Hash output of measured length, and there is preferable unipolarity, it is impossible to obtained defeated by output backstepping easily Enter, the confidential nature good due to hash function and verifying function, be therefore widely used in digital signature, Download the application such as verification, password storage.
The method of password cracking cryptographic Hash includes the violence method of exhaustion and dictionary lookup method, and the violence method of exhaustion is to letter Single password and simple cryptographic system are feasible, but for complicated password and cryptographic system, then can Produce infinitely-great dictionary, thus need the calculating time of magnanimity;And dictionary lookup rule needs magnanimity Memory space, deciphering cost is the highest.
In order to reduce the size of required dictionary, reducing the time producing and searching dictionary, prior art carries For a kind of solution rainbow table for chain, it is based on the theoretical (base of Martin Hellman Impersonal-weight Parameter Theory in internal memory Yu time).Rainbow table is the exhaustive compromise with dictionary lookup of violence, by anticipated The mode calculated reduces the time cost of password recovery, and its core concept is by calculated Hash in plain text Value is returned to plaintext space by a mapping function, and then alternately calculates plaintext and cryptographic Hash, to subtract The time that few hash value password is recovered.
Spark is a bunch computing framework of increasing income, and is initially by University of California Berkeley AMPLab Developed.After having run work, broker data can be stored in relative to the MapReduce of Hadoop In disk, Spark employs computing in memorizer, can deposit when data not yet write hard disk Analytic operation in reservoir.Spark runs the arithmetic speed of program in memorizer can be accomplished to compare Hadoop On the fast operation of MapReduce 100 times, even if the program of operation is when hard disk, Spark also can Fast upper 10 speeds.The basic data structure of Spark is RDD, and operation is encapsulated in by Spark platform In transformation and action, wherein transformation is the conversion to RDD, and action is RDD is calculated.Calling the API in the action of transformation, Spark platform can be voluntarily Carrying out distributed arithmetic, Spark only need to be configured by programmer, it is not necessary to considers distributed is how to enter Row, this greatly reduces the threshold that platform uses.
Summary of the invention
In order to overcome the shortcoming of above-mentioned prior art, it is an object of the invention to provide a kind of based on Spark The password cryptographic Hash restoration methods of platform and device, can realize the parallel generation of Large Copacity rainbow table, rainbow Chain parallel filtering and rainbow chain are deciphered parallel so that it is have the advantage such as high-performance, low threshold.
To achieve these goals, the technical solution used in the present invention is:
Utilize Spark platform to carry out distributed parallel and generate rainbow table and deciphering.In the mistake generating rainbow table Cheng Zhong, needs to generate the joint of the chain tail value of its correspondence according to the first-in-chain(FIC) nodal value of all stochastic generation.Utilize The map function of Spark platform, can carry out independent operation to each first-in-chain(FIC) node, say, that Generate rainbow table and can which greatly enhances formation efficiency with highly-parallel.Rainbow table is in HDFS It is to carry out storing in the way of piecemeal, calls the filter function of Spark platform, can be concurrently from respectively Block finds out the rainbow chain that ciphertext to be decrypted is corresponding, and this is greatly accelerated the speed of text matches.Utilize Spark The foreach function of platform, can calculate corresponding to ciphertext to be decrypted concurrently from rainbow chain is bright Literary composition.
Specifically, the technical scheme is that
A kind of password cryptographic Hash restoration methods based on Spark platform, including rainbow table data genaration step With rainbow table decryption step, it is characterised in that
If the quantity of rainbow chain is S, a length of L, L > 1, the most described rainbow table data genaration step includes:
Step A: according to S first-in-chain(FIC) nodal value SV of character set stochastic generation;
Step B: according to the create-rule of rainbow chain, calculates chain periproct corresponding to first-in-chain(FIC) nodal value SV Point value EV;
Step C: the tuple of all (SV, the EV) that generate is saved in Hadoop distributed file system In HDFS;
Described rainbow table decryption step includes:
Step D: read rainbow table from HDFS;
Step E: filter out the rainbow chain that ciphertext is corresponding from rainbow table;
Step F: the rainbow chain according to obtaining calculates the plaintext that this ciphertext is corresponding;
Specifically, the calculating of described joint of the chain tail value EV comprises the following steps:
Step B1: each first-in-chain(FIC) nodal value SV is performed L-1 f function, generates L-2 middle node Point and a joint of the chain tail;F function includes H function and two parts of R function;Wherein H function i.e. refers to Fixed encryption function, R function is the function (1≤i≤L-1) relevant with present node position i, this letter The definition territory of number and codomain need and H function is contrary;Use R hereiniRepresent that parameter is the R function of i, fi Represent H function and RiThe combination of function;R can be madei(wherein X represents process to=(X+i) mod N Character string after H function process, N represents scope in plain text);Step B2: call Spark platform Map function is performed in parallel step B1.
The rainbow chain filtering out ciphertext in described rainbow table corresponding comprises the following steps:
Step E1: guess the position i in rainbow chain of the plaintext corresponding to ciphertext to be decrypted, successively from L-1 Attempt to 1;
Step E2: ciphertext is performed RiFunction, is saved in result in intermediate node M;Again M is held Row fi+1, fi+2..., fL-1, result is assigned to M;
Step E3: the filter function calling Spark platform filters out all joint of the chain tail values etc. concurrently In the rainbow chain of M, if rainbow table does not has the joint of the chain tail value rainbow chain equal to M, it tries next Individual i;If satisfactory rainbow chain is not all found in all trials, then decipher failure;If there is chain periproct The point value rainbow chain equal to M, then enter next step.
Calculate according to rainbow chain and comprise the following steps in plain text:
Step F1: obtain plaintext corresponding to this ciphertext position i in rainbow chain from step E, to this The first-in-chain(FIC) nodal value SV of rainbow chain performs f1, f2..., fi-1, it is corresponding that the result that obtains is this ciphertext In plain text.
The present invention proposes a kind of password cryptographic Hash recovery device based on Spark platform simultaneously, including Spark Dispensing unit, rainbow table data generating unit and rainbow table decryption unit, wherein:
Spark dispensing unit performs the preparation of this recovery device, the calculating energy providing Spark platform Power configures;
Rainbow table data generating unit produces the set of some rainbow chains, and every rainbow chain by one is all Row Hash operation and mapping function iterative computation obtain, and rainbow table data generating unit only needs to store first-in-chain(FIC) Node and joint of the chain tail;
The plaintext position that rainbow table decryption unit is treated corresponding to decrypting ciphertext is guessed, finding should The joint of the chain tail that ciphertext is corresponding;Then in rainbow table, find the chain periproct that joint of the chain tail is corresponding with this ciphertext The rainbow chain that point is identical, calculates, according to these rainbow chains, the plaintext that this ciphertext is corresponding.
Specifically, the preparation of described Spark dispensing unit specifically includes that
Build Spark platform, configure Master and Slave, the most again Worker quantity and size are entered Row configuration.
Described rainbow table data generating unit performs function and specifically includes that
S first-in-chain(FIC) nodal value of stochastic generation, then according to rainbow chain create-rule, calculates first-in-chain(FIC) nodal value Corresponding joint of the chain tail value, result of calculation is stored in Hadoop by the map function calling Spark platform In distributed file system HDFS.
Described rainbow table decryption unit performs function and specifically includes that
Guess the position i in rainbow chain of the plaintext corresponding to ciphertext to be decrypted, ciphertext is performed RiFunction, Result is saved in intermediate node M;Again M is performed fi+1, fi+2..., fL-1, result is assigned to M, obtains the joint of the chain tail that this ciphertext is corresponding;Then the filter function of Spark platform is called from rainbow table In filter out the joint of the chain tail rainbow chain equal to joint of the chain tail corresponding to ciphertext, if rainbow table does not has last-of-chain The nodal value rainbow chain equal to M, it tries next i;If all trials are not all found satisfactory Rainbow chain, then decipher failure;If there is the joint of the chain tail value rainbow chain equal to M, then call Spark and put down The foreach function of platform calculates, to each rainbow chain, the plaintext that this ciphertext is corresponding.
Compared with prior art, the invention has the beneficial effects as follows: utilize Spark platform efficient in internal memory Calculate and the feature of highly-parallel, greatly increase the generation of rainbow table and the efficiency of deciphering.
Accompanying drawing explanation
Fig. 1 is flow chart based on Spark platform password cryptographic Hash restoration methods.
Fig. 2 is the flow chart generating rainbow matrix section based on Spark platform password cryptographic Hash restoration methods.
Fig. 3 is to treat decrypting ciphertext based on Spark platform password cryptographic Hash restoration methods to be decrypted part Flow chart.
Fig. 4 is functional block diagram based on Spark platform password cryptographic Hash recovery device.
Fig. 5 is functional block diagram based on Spark platform password cryptographic Hash recovery device rainbow table signal generating unit.
Fig. 6 is functional block diagram based on Spark platform password cryptographic Hash recovery device decryption unit.
Detailed description of the invention
Embodiments of the present invention are described in detail below in conjunction with the accompanying drawings with embodiment.
Spark is the general of the class Hadoop MapReduce that increased income of UC Berkeley AMP lab Parallel computation frame, the Distributed Calculation that Spark realizes based on map reduce algorithm, have Hadoop MapReduce have the advantage that.Additionally, in the middle of Spark task, output and result can be saved in In depositing, this can accelerate the read-write efficiency calculated.RDD is the most basic abstract of Spark, is to distribution The abstract use of formula internal memory, it is achieved that operate taking out of distributed data collection in the way of the set of operation this locality As realizing.
RDD is the thing that Spark is most crucial, and it represents and is partitioned, immutable and can be by parallel The data acquisition system of operation, the corresponding different RDD of different data set format realizes.RDD must be can Serializing.RDD can be with in cache to internal memory, every time to the knot after the operation of RDD data set Really, can be stored in internal memory, next operation can directly input from internal memory, eliminates The substantial amounts of disk I/O operation of MapReduce.
The present invention utilizes the internal memory of Spark platform to calculate and highly-parallel just, utilizes RDD as centre As a result, realize rainbow table efficiently to generate and deciphering.Specifically, the one of the present invention is put down based on Spark The password Hash restoration methods of platform, including 3 steps as shown in Figure 1.
Step1, configures Spark platform parameters, mainly includes building Spark platform, configuration Spark puts down Master and Slave (i.e. configuration how many main frames of Spark platform courses) of platform and configuration Spark platform Worker quantity and size (i.e. configure worker thread quantity that every main frame has and each thread can The internal memory used and the size of CPU).
Step2, generates rainbow table.
Step3, treats decrypting ciphertext and is decrypted.
Specifically, the generation step of rainbow table include (see Fig. 2, if the size of rainbow table is S, every coloured silk The a length of L (L > 1) of rainbow chain, rainbow chain first-in-chain(FIC) nodal value is SV (Start Value), and joint of the chain tail value is EV (End Value)):
Step 21, S rainbow first-in-chain(FIC) nodal value SV of stochastic generation, be saved in list list.
Step 22, according to the create-rule of rainbow chain, using each SV in list as rainbow first-in-chain(FIC) node Value calculates joint of the chain tail value EV, calls the map function in the transformation operation of Spark, All (SV, EV) tuples are generated RDD data set.
Step 23, is saved in RDD data set in HDFS.
The decryption step of rainbow table includes (see Fig. 3):
Step 31, reads in rainbow table from HDFS.
Step 32, the position i at the plaintext place that conjecture ciphertext is corresponding, perform R to ciphertextiFunction, by result It is saved in intermediate node M.
Step 33, performs f to Mi+1, fi+2..., fL-1, result is assigned to M.
Step 34, filters out the joint of the chain tail value EV rainbow chain equal to M from rainbow table.
Step 32~Step34 specifically comprises the following steps that
Initialization i is L-1;
Ciphertext to be decrypted is performed RiFunction, obtains intermediate node M;
Make j=i+1;
If j≤L-1, then M is performed H function, Rj+1Function, and result is assigned to M, go to (5); Otherwise go to (6);
Make j=j+1, go to (4);
Call the filter function in the transformation operation of Spark, from rainbow table, filter out institute EV is had to be equal to the SV of M.If the quantity of SV is equal to 0, then makes i=i-1, if i > 0, then go to (2), If i=0, otherwise decipher failure;If the quantity of SV is more than 0, then enter next step;
Step 35, calls the foreach function in the action operation of Spark, to each qualified Rainbow chain first-in-chain(FIC) nodal value SV performs f1, f2 ..., fi-1, the result obtained is the plaintext of correspondence.
The present invention proposes a kind of based on Spark platform password Hash recovery device simultaneously, including such as Fig. 4 institute 3 unit shown, Spark dispensing unit, rainbow table signal generating unit and decryption unit.
Wherein, the function that Spark dispensing unit performs includes:
Build Spark platform, configure Master and Slave, and configure Worker quantity and size.
As it is shown in figure 5, the function that rainbow table signal generating unit performs includes:
First-in-chain(FIC) node signal generating unit, this unit is used for S first-in-chain(FIC) node of stochastic generation, and ensures node Do not repeat.
Joint of the chain tail computing unit, this unit, according to rainbow chain create-rule, calculates first-in-chain(FIC) nodal value corresponding Joint of the chain tail value, call the map function of Spark platform and result of calculation be stored in Hadoop distribution In formula file system HDFS
As shown in Figure 6, the function that decryption unit performs includes:
The joint of the chain tail computing unit that ciphertext is corresponding, this unit conjecture plaintext corresponding to ciphertext to be decrypted exists Position i in rainbow chain, performs R to ciphertextiFunction, is saved in result in intermediate node M, then holds M Row fi+1, fi+2..., fL-1, result is assigned to M, obtains the joint of the chain tail that this ciphertext is corresponding.
Rainbow chain filter element, the filter function of this cell call Spark platform filters out from rainbow table The rainbow chain of the joint of the chain tail that joint of the chain tail is corresponding equal to ciphertext.
Generating unit in plain text, each rainbow chain is calculated by the foreach function of this cell call Spark platform The plaintext that this ciphertext is corresponding.
Above one provided by the present invention is entered based on Spark platform password Hash restoration methods and device Having gone and be discussed in detail, principle and specific embodiment to the present invention are set forth herein, above in detail Thin step be adapted to assist in method and the core concept understanding the present invention;Technology simultaneously for this area Personnel, according to the thought of the present invention, in place of concrete implementation mode all has changes and improvements, this Within a little changes and improvements belong to protection scope of the present invention.

Claims (8)

1. a password cryptographic Hash restoration methods based on Spark platform, including rainbow table data genaration step and rainbow table decryption step, it is characterised in that
If the quantity of rainbow chain is S, a length of L, L > 1, the most described rainbow table data genaration step includes:
Step A: according to S first-in-chain(FIC) nodal value SV of character set stochastic generation;
Step B: according to the create-rule of rainbow chain, calculates joint of the chain tail value EV corresponding to first-in-chain(FIC) nodal value SV;
Step C: the tuple of all (SV, the EV) that generate is saved in Hadoop distributed file system HDFS;
Described rainbow table decryption step includes:
Step D: read rainbow table from HDFS;
Step E: filter out the rainbow chain that ciphertext is corresponding from rainbow table;
Step F: the rainbow chain according to obtaining calculates the plaintext that this ciphertext is corresponding.
Password cryptographic Hash restoration methods based on Spark platform the most according to claim 1, it is characterised in that the calculating of described joint of the chain tail value EV comprises the following steps:
Step B1: each first-in-chain(FIC) nodal value SV is performed L-1 f function, generates L-2 intermediate node and a joint of the chain tail;F function includes H function and two parts of R function;The encryption function that wherein H function is i.e. specified, R function is the function (1≤i≤L-1) relevant with present node position i, and the definition territory of this function and codomain need and H function is contrary;Use RiRepresent that parameter is the R function of i, fiRepresent H function and RiThe combination of function;Make Ri=(X+i) mod N, wherein X represents the character string after H function processes, and N represents scope in plain text;
Step B2: the map function calling Spark platform is performed in parallel step B1.
Password cryptographic Hash restoration methods based on Spark platform the most according to claim 2, it is characterised in that the rainbow chain filtering out ciphertext in described rainbow table corresponding comprises the following steps:
Step E1: guess the position i in rainbow chain of the plaintext corresponding to ciphertext to be decrypted, attempt to 1 from L-1 successively;
Step E2: ciphertext is performed RiFunction, is saved in result in intermediate node M;Again M is performed fi+1, fi+2..., fL-1, result is assigned to M;
Step E3: the filter function calling Spark platform filters out all joint of the chain tail values rainbow chain equal to M concurrently, if not having the joint of the chain tail value rainbow chain equal to M, it tries next i in rainbow table;If satisfactory rainbow chain is not all found in all trials, then decipher failure;If there is the joint of the chain tail value rainbow chain equal to M, then enter next step.
Password cryptographic Hash restoration methods based on Spark platform the most according to claim 3, it is characterised in that calculate according to rainbow chain and comprise the following steps in plain text:
Step F1: obtain plaintext corresponding to this ciphertext position i in rainbow chain from step E, performs f to the first-in-chain(FIC) nodal value SV of this rainbow chain1, f2..., fi-1, the result obtained is the plaintext that this ciphertext is corresponding.
5. a password cryptographic Hash recovery device based on Spark platform, it is characterised in that include Spark dispensing unit, rainbow table data generating unit and rainbow table decryption unit, wherein:
Spark dispensing unit performs the preparation of this recovery device, and the computing capability providing Spark platform configures;
Rainbow table data generating unit produces the set of some rainbow chains, and every rainbow chain is all obtained by a series of Hash operation and mapping function iterative computation, and rainbow table data generating unit only needs to store first-in-chain(FIC) node and joint of the chain tail;
The plaintext position that rainbow table decryption unit is treated corresponding to decrypting ciphertext is guessed, finds the joint of the chain tail that this ciphertext is corresponding;Then in rainbow table, find the rainbow chain that joint of the chain tail that joint of the chain tail is corresponding with this ciphertext is identical, calculate, according to these rainbow chains, the plaintext that this ciphertext is corresponding.
Password cryptographic Hash recovery device based on Spark platform the most according to claim 5, it is characterised in that the preparation of described Spark dispensing unit specifically includes that
Build Spark platform, configure Master and Slave, the most again Worker quantity and size are configured.
Password cryptographic Hash recovery device based on Spark platform the most according to claim 5, it is characterised in that
Described rainbow table data generating unit performs function and specifically includes that
S first-in-chain(FIC) nodal value of stochastic generation, then according to rainbow chain create-rule, calculates the joint of the chain tail value that first-in-chain(FIC) nodal value is corresponding, and result of calculation is stored in Hadoop distributed file system HDFS by the map function calling Spark platform.
Password cryptographic Hash recovery device based on Spark platform the most according to claim 5, it is characterised in that described rainbow table decryption unit performs function and specifically includes that
Guess the position i in rainbow chain of the plaintext corresponding to ciphertext to be decrypted, ciphertext is performed RiFunction, is saved in result in intermediate node M;Again M is performed fi+1, fi+2..., fL-1, result is assigned to M, obtains the joint of the chain tail that this ciphertext is corresponding;Then the filter function calling Spark platform filters out the rainbow chain of the joint of the chain tail joint of the chain tail corresponding equal to ciphertext from rainbow table, if not having the joint of the chain tail value rainbow chain equal to M in rainbow table, it tries next i;If satisfactory rainbow chain is not all found in all trials, then decipher failure;If there is the joint of the chain tail value rainbow chain equal to M, then the foreach function calling Spark platform calculates, to each rainbow chain, the plaintext that this ciphertext is corresponding.
CN201610211597.3A 2016-04-06 2016-04-06 Spark platform-based password hash value recovery method and device Pending CN105933120A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201610211597.3A CN105933120A (en) 2016-04-06 2016-04-06 Spark platform-based password hash value recovery method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201610211597.3A CN105933120A (en) 2016-04-06 2016-04-06 Spark platform-based password hash value recovery method and device

Publications (1)

Publication Number Publication Date
CN105933120A true CN105933120A (en) 2016-09-07

Family

ID=56840228

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201610211597.3A Pending CN105933120A (en) 2016-04-06 2016-04-06 Spark platform-based password hash value recovery method and device

Country Status (1)

Country Link
CN (1) CN105933120A (en)

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106712928A (en) * 2016-12-13 2017-05-24 云南电网有限责任公司电力科学研究院 Big data rainbow table based decryption method and device
CN108038382A (en) * 2017-10-18 2018-05-15 北京丁牛科技有限公司 The processing method and system of rainbow chained list based on CPU-GPU frameworks
CN108416208A (en) * 2018-02-05 2018-08-17 深圳大普微电子科技有限公司 A kind of method of decryption, host equipment and storage device
CN112287374A (en) * 2020-11-18 2021-01-29 中国电子科技集团公司第三十研究所 Excel ciphertext document recovery method, computer equipment and storage medium

Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103400072A (en) * 2013-07-31 2013-11-20 厦门市美亚柏科信息股份有限公司 Hash value password recovering method and device
US8819795B2 (en) * 2012-02-01 2014-08-26 Amazon Technologies, Inc. Presenting managed security credentials to network sites
CN104281816A (en) * 2014-10-14 2015-01-14 厦门智芯同创网络科技有限公司 Rainbow table parallel system design method and device based on MapReduce

Patent Citations (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US8819795B2 (en) * 2012-02-01 2014-08-26 Amazon Technologies, Inc. Presenting managed security credentials to network sites
CN103400072A (en) * 2013-07-31 2013-11-20 厦门市美亚柏科信息股份有限公司 Hash value password recovering method and device
CN104281816A (en) * 2014-10-14 2015-01-14 厦门智芯同创网络科技有限公司 Rainbow table parallel system design method and device based on MapReduce

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
JASONJERRY0: "MapReduce VS Spark", 《百度文库》 *
仇李寅: "基于Hadoop的扩展彩虹表生成研究", 《中国优秀硕士学位论文全文数据库 信息科技辑》 *

Cited By (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106712928A (en) * 2016-12-13 2017-05-24 云南电网有限责任公司电力科学研究院 Big data rainbow table based decryption method and device
CN108038382A (en) * 2017-10-18 2018-05-15 北京丁牛科技有限公司 The processing method and system of rainbow chained list based on CPU-GPU frameworks
CN108416208A (en) * 2018-02-05 2018-08-17 深圳大普微电子科技有限公司 A kind of method of decryption, host equipment and storage device
CN112287374A (en) * 2020-11-18 2021-01-29 中国电子科技集团公司第三十研究所 Excel ciphertext document recovery method, computer equipment and storage medium

Similar Documents

Publication Publication Date Title
CN104038349B (en) Effective and verifiable public key searching encryption method based on KP-ABE
CN103825723B (en) A kind of encryption method and device
CN101853190B (en) Data integrity verification method suitable for embedded processor
CN102509036B (en) Reconfigurable cipher processor and anti-power consumption attach method
CN110413652B (en) Big data privacy retrieval method based on edge calculation
Teng et al. A Modified Advanced Encryption Standard for Data Security.
CN105933120A (en) Spark platform-based password hash value recovery method and device
CN106776904A (en) The fuzzy query encryption method of dynamic authentication is supported in a kind of insincere cloud computing environment
CN103019648A (en) True random number generator with digital post-processing circuit
CN106874516A (en) Efficient cipher text retrieval method based on KCB trees and Bloom filter in a kind of cloud storage
KR20140011534A (en) Generating and verifying the alternative data in a specified format
Liu et al. Offline/online attribute‐based encryption with verifiable outsourced decryption
CN107592298A (en) A kind of sequence comparison algorithm based on single server model safely outsourced method, user terminal and server
CN104484615B (en) Suitable for reconfigurable arrays framework based on space randomization fault-resistant attack method
Ma et al. CP-ABE-based secure and verifiable data deletion in cloud
CN104463020A (en) Method for protecting data integrity of memory
CN103400072A (en) Hash value password recovering method and device
CN107483182A (en) A kind of anti-power consumption attack method towards aes algorithm based on Out-of-order execution
CN109039590A (en) Memory, electronic equipment and its encipher-decipher method for preventing side-channel attack
CN103873239A (en) Method for rapid generation of even number prime pair based on application of even number public key system
Sprengers et al. Speeding up GPU-based password cracking
CN106059748B (en) A kind of lightweight secure storage method of data regenerating code safely based on block
Xu et al. Massive fishing website URL parallel filtering method
CN103618599B (en) Data set encryption pre-treating method
Sayed et al. Split-n-Swap: A New Modification of the Twofish Block Cipher Algorithm

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20160907

RJ01 Rejection of invention patent application after publication