CN110362987A - A kind of lightweight assessment algorithm of Cipher Strength - Google Patents

A kind of lightweight assessment algorithm of Cipher Strength Download PDF

Info

Publication number
CN110362987A
CN110362987A CN201910582570.9A CN201910582570A CN110362987A CN 110362987 A CN110362987 A CN 110362987A CN 201910582570 A CN201910582570 A CN 201910582570A CN 110362987 A CN110362987 A CN 110362987A
Authority
CN
China
Prior art keywords
password
editing distance
cipher
given
vector
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN201910582570.9A
Other languages
Chinese (zh)
Inventor
邱天
李千目
蔡俊辉
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Nanjing Tech University
Original Assignee
Nanjing Tech University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Nanjing Tech University filed Critical Nanjing Tech University
Priority to CN201910582570.9A priority Critical patent/CN110362987A/en
Publication of CN110362987A publication Critical patent/CN110362987A/en
Pending legal-status Critical Current

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Information Retrieval, Db Structures And Fs Structures Therefor (AREA)

Abstract

The invention discloses a kind of lightweight assessment algorithms of Cipher Strength, given password and standard strong cipher are indicated with vector, which is made of number, lowercase, capitalization, spcial character and Password Length;According to given crypto vector and standard strong cipher vector, the cosine length similarity of given password and standard strong cipher is calculated;The quantity of insertion needed for given password is converted to standard strong cipher by statistics, replacement and delete operation calculates the editing distance similarity of given password and standard strong cipher;Comprehensive cosine length similarity and editing distance similarity determine the bulk strength of given password.The present invention evaluates and tests algorithm better than existing lightweight Cipher Strength in terms of the accuracy of identification strong cipher and weak password, and the memory space needed is very small, and client password strength assessment is suitble to use.

Description

A kind of lightweight assessment algorithm of Cipher Strength
Technical field
The present invention relates to field of information security technology, the lightweight assessment algorithm of especially a kind of Cipher Strength.
Background technique
Password authentification is the first line of defence for protecting network system.Text password is a kind of common authentication form, For the safety for ensuring text password authentication, many systems add password detection instrument on website, pass through text and face Vitta intuitively shows Cipher Strength, helps user setting high-intensitive and is easy the high-intensitive password of memory.
Rule-based method measures Cipher Strength by simple rule, can not capture password complexity, it is difficult to The accurate intensity for estimating given password, is often labeled as strong cipher for weak password, and strong cipher is labeled as weak password.Based on general The conjecture algorithm of rate uses the property guessed to measure as Cipher Strength, has very high accuracy in terms of testing Cipher Strength, But the algorithm is computation-intensive, needs a large amount of memory space, is not suitable in client deployment.There are also some other skills Art, such as password dictionary is used, due to the problems such as there are long operational time and big data spaces, be not suitable for directly in client User password intensity is detected on end or webpage.
Summary of the invention
The purpose of the present invention is to provide a kind of lightweight assessment algorithms of Cipher Strength.
The technical solution for realizing the aim of the invention is as follows: a kind of lightweight assessment algorithm of Cipher Strength (Lightweight Password-Strength Estimation, LPSE), the specific steps are as follows:
Given password and standard strong cipher are indicated that the vector is by number, lowercase, capital letter by step 1 with vector Female, spcial character and Password Length composition;
Step 2, basis give crypto vector and standard strong cipher vector, calculate the cosine of given password and standard strong cipher Length similarity;
The quantity of insertion needed for given password is converted to standard strong cipher by step 3, statistics, replacement and delete operation, Calculate the editing distance similarity of given password and standard strong cipher;
Step 4, comprehensive cosine length similarity and editing distance similarity determine the bulk strength of given password.
Compared with prior art, the present invention its remarkable advantage are as follows: accuracy of the present invention in identification strong cipher and weak password Aspect evaluates and tests algorithm better than existing lightweight Cipher Strength, and the memory space needed is very small, is suitble to client password Strength assessment uses.
Detailed description of the invention
Fig. 1 is the flow chart of the lightweight assessment algorithm of Cipher Strength of the present invention.
Specific embodiment
In the following with reference to the drawings and specific embodiments, the present invention program is further illustrated.
As shown in Figure 1, a kind of lightweight assessment algorithm of Cipher Strength, the specific steps are as follows:
Given password and standard strong cipher are indicated that the vector is by number, lowercase, capital letter by step 1 with vector Female, spcial character and Password Length composition, each component be respectively as follows: digital number * 1, lowercase * 1, capitalization number mother number * 2, Spcial character number * 3, Password Length;The standard strong cipher need to meet two conditions, first is that password was randomly generated, i.e., Password has the different types of character of equal probabilities, second is that password long enough (for example, at least 12).
Step 2, basis give crypto vector and standard strong cipher vector, calculate the cosine of given password and standard strong cipher Length similarity;
Assuming that the vector of given password is expressed as α=(x1,x2,x3,x4,x5), the vector of standard strong cipher is expressed as αs= (y1,y2,y3,y4,y5), then the cosine length similarity of two vectors is calculated by formula (1):
Wherein, | X | and | Y | given crypto vector and standard strong cipher vector field homoemorphism are respectively indicated, is calculated by formula (2):
The quantity of insertion needed for given password is converted to standard strong cipher by step 3, statistics, replacement and delete operation, Calculate the editing distance similarity of given password and standard strong cipher;
Step 3.1, initial editing distance are set as 0, when given password is converted to standard strong cipher, according to corresponding position Editing distance is added and subtracted in the operation of execution, and specific rules are as follows:
(1) when corresponding position carries out delete operation, editing distance executes subtraction: if deleting number or lowercase, Editing distance subtracts 1;If deleting capitalization, editing distance subtracts 2;If deleting spcial character, editing distance subtracts 3;
(2) when corresponding position carries out insertion operation, editing distance executes addition: if insertion number or lowercase, Editing distance adds 1;If being inserted into capitalization, editing distance adds 2;If being inserted into spcial character, editing distance adds 3;
(3) when corresponding position is replaced operation, editing distance executes addition or subtraction: if replaced with capitalization small Letter or number is write, then editing distance adds 1, if replacing lowercase or number with spcial character, editing distance adds 2, such as Fruit replaces number, or number replacement lowercase with lowercase, then editing distance is constant, if replaced with lowercase special Different character, then editing distance subtracts 2.
Step 3.2 calculates password editing distance similarity by password editing distance (formula 3):
Wherein, | P |, | T | indicate the component summation of given password and standard strong cipher, passworddist (P, T) is close Code editing distance.
Step 4, comprehensive cosine length similarity and editing distance similarity determine the bulk strength of given password;
Assuming that given password is expressed as α, S is expressed as with the cosine length similitude of standard strong cipherc(α), with mark The editing distance of quasi- strong cipher is expressed as Sp(α), then the bulk strength of password α is by T α=(Sc(α),Sp(α)) it indicates, it can basis Formula (4) determines:
Embodiment
In order to verify the validity of the present invention program, following emulation experiment is carried out, given password: ChinaGood101 is measured Cipher Strength.
Step 1, the premise as experiment generate standard strong cipher according to standard strong cipher rule first:: HelloWTO58.#, the corresponding vector of the strong cipher are αs=(2,5,6,6,12), the component on each position respectively represent number Word number * 1, lowercase * 1, capitalization number mother number * 2, spcial character number * 3, Password Length.Given password is also used into vector It indicates, α=(3,7,4,0,12).
Step 2, the cosine length similarity for calculating two crypto vectors, are calculated by formula (1);
Wherein, | X | and | Y | given crypto vector and standard strong cipher vector field homoemorphism are respectively indicated, is calculated by formula (2):
It is computed, P can be obtainedxy≈0.85
Step 3 calculates password editing distance, and initial editing distance is set as 0, given password is converted to standard strong cipher When, editing distance is added and subtracted according to the operation that the two password corresponding positions execute, specific rules are as follows:
(1) when corresponding position carries out delete operation, editing distance executes subtraction: if deleting number or lowercase, Editing distance subtracts 1;If deleting capitalization, editing distance subtracts 2;If deleting spcial character, editing distance subtracts 3;
(2) when corresponding position carries out insertion operation, editing distance executes addition: if insertion number or lowercase, Editing distance adds 1;If being inserted into capitalization, editing distance adds 2;If being inserted into spcial character, editing distance adds 3.
(3) when corresponding position is replaced operation, editing distance executes addition or subtraction: if replaced with capitalization small Letter or number is write, then editing distance adds 1, if replacing lowercase or number with spcial character, editing distance adds 2, such as Fruit replaces number, or number replacement lowercase with lowercase, then editing distance is constant, if replaced with lowercase special Different character, then editing distance subtracts 2.
Password editing distance similarity is calculated, password editing distance similarity is calculated by formula (3):
Wherein, | P |, | T | the component summation for indicating given password and standard strong cipher, by number, lowercase, capital letter Female, spcial character number is obtained multiplied by summing after corresponding weight, and passworddist (P, T) is password editing distance, warp It calculates, Passwordsimilarity ≈ 0.74 can be obtained.
Step 4 determines given password according to the cosine length similarity and editing distance similarity of standard strong cipher Bulk strength.
For giving password α=(3,7,4,0,12), S is expressed as with the cosine length similitude of standard strong cipherc(α) =0.85, and the editing distance of itself and standard strong cipher is expressed as Sp(α)=0.74, the bulk strength of password α can by T α= (Sc(α),Sp(α)), formula (4) can be calculated:
It is computed, T can be obtainedα=strong, i.e., given password can be considered strong cipher.

Claims (6)

1. a kind of lightweight assessment algorithm of Cipher Strength, which is characterized in that specific step is as follows:
Given password and standard strong cipher are indicated that the vector is by number, lowercase, capitalization, spy by step 1 with vector Different character and Password Length composition;
Step 2, basis give crypto vector and standard strong cipher vector, calculate the cosine length of given password and standard strong cipher Similarity;
The quantity of insertion needed for given password is converted to standard strong cipher by step 3, statistics, replacement and delete operation, calculates The editing distance similarity of given password and standard strong cipher;
Step 4, comprehensive cosine length similarity and editing distance similarity determine the bulk strength of given password.
2. the lightweight assessment algorithm of Cipher Strength according to claim 1, which is characterized in that in step 1, give password Each component of vector sum standard strong cipher vector is respectively as follows: digital number * 1, lowercase * 1, capitalizes number mother number * 2, is special Character number * 3, Password Length.
3. the lightweight assessment algorithm of Cipher Strength according to claim 1, which is characterized in that in step 1, standard is close by force Code need to meet two conditions, first is that password was randomly generated, i.e. the password different types of character with equal probabilities, second is that Password long enough, length are greater than given threshold.
4. the lightweight assessment algorithm of Cipher Strength according to claim 1, which is characterized in that in step 2, calculate given Password and standard strong cipher cosine length similarity method particularly includes:
If the vector of given password is expressed as α=(x1,x2,x3,x4,x5), the vector of standard strong cipher is expressed as αs=(y1,y2, y3,y4,y5), then the cosine length similarity of two vectors is calculated by formula (1):
Wherein, | X | and | Y | given crypto vector and standard strong cipher vector field homoemorphism are respectively indicated, is calculated by formula (2):
5. the lightweight assessment algorithm of Cipher Strength according to claim 1, which is characterized in that in step 3, calculate given The editing distance similarity of password and standard strong cipher method particularly includes:
Step 3.1, initial editing distance are set as 0, when given password is converted to standard strong cipher, are executed according to corresponding position Operation editing distance is added and subtracted, specific rules are as follows:
(1) when corresponding position carries out delete operation, editing distance executes subtraction: if deleting number or lowercase, editing Distance subtracts 1;If deleting capitalization, editing distance subtracts 2;If deleting spcial character, editing distance subtracts 3;
(2) when corresponding position carries out insertion operation, editing distance executes addition: if insertion number or lowercase, are edited Distance plus 1;If being inserted into capitalization, editing distance adds 2;If being inserted into spcial character, editing distance adds 3;
(3) when corresponding position is replaced operation, editing distance executes addition or subtraction: if replacing small letter with capitalization Female or number, then editing distance adds 1, if adding 2 with spcial character replacement lowercase or number, editing distance, if with Lowercase replacement number, or number replacement lowercase, then editing distance is constant, if replacing special word with lowercase Symbol, then editing distance subtracts 2;
Step 3.2, password editing distance similarity are calculated by formula 3:
Wherein, | P |, | T | indicate the component summation of given password and standard strong cipher, passworddist (P, T) is password volume Collect distance.
6. the lightweight assessment algorithm of Cipher Strength according to claim 1, which is characterized in that in step 4, calculate given The bulk strength of password method particularly includes:
If given password is expressed as α, S is expressed as with the cosine length similitude of standard strong cipherc(α), with standard strong cipher Editing distance be expressed as Sp(α), the bulk strength of password α is by T α=(Sc(α),Sp(α)) it indicates, it is determined according to formula (4):
CN201910582570.9A 2019-06-29 2019-06-29 A kind of lightweight assessment algorithm of Cipher Strength Pending CN110362987A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201910582570.9A CN110362987A (en) 2019-06-29 2019-06-29 A kind of lightweight assessment algorithm of Cipher Strength

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201910582570.9A CN110362987A (en) 2019-06-29 2019-06-29 A kind of lightweight assessment algorithm of Cipher Strength

Publications (1)

Publication Number Publication Date
CN110362987A true CN110362987A (en) 2019-10-22

Family

ID=68217686

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201910582570.9A Pending CN110362987A (en) 2019-06-29 2019-06-29 A kind of lightweight assessment algorithm of Cipher Strength

Country Status (1)

Country Link
CN (1) CN110362987A (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111046375A (en) * 2019-11-28 2020-04-21 福建吉诺车辆服务股份有限公司 System password auditing method and terminal
CN118551364A (en) * 2024-07-30 2024-08-27 苏州市软件评测中心有限公司 Commercial password security assessment method and system based on deep learning

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106649273A (en) * 2016-12-26 2017-05-10 东软集团股份有限公司 Text processing method and text processing device
CN109299277A (en) * 2018-11-20 2019-02-01 中山大学 The analysis of public opinion method, server and computer readable storage medium

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN106649273A (en) * 2016-12-26 2017-05-10 东软集团股份有限公司 Text processing method and text processing device
CN109299277A (en) * 2018-11-20 2019-02-01 中山大学 The analysis of public opinion method, server and computer readable storage medium

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN111046375A (en) * 2019-11-28 2020-04-21 福建吉诺车辆服务股份有限公司 System password auditing method and terminal
CN118551364A (en) * 2024-07-30 2024-08-27 苏州市软件评测中心有限公司 Commercial password security assessment method and system based on deep learning

Similar Documents

Publication Publication Date Title
Liu et al. Reactance perturbation for detecting and identifying FDI attacks in power system state estimation
Golla et al. On the accuracy of password strength meters
Qu et al. Natural language understanding with privacy-preserving bert
Guo et al. LPSE: Lightweight password-strength estimation for password meters
US11470097B2 (en) Profile generation device, attack detection device, profile generation method, and profile generation computer program
CN105224600B (en) A kind of detection method and device of Sample Similarity
Liu et al. aleak: Privacy leakage through context-free wearable side-channel
CN108885912B (en) System for setting relative tolerance limits by using repeated cross validation and method thereof
CN110362987A (en) A kind of lightweight assessment algorithm of Cipher Strength
Gast et al. Size expansions of mean field approximation: Transient and steady-state analysis
EP3040901A1 (en) System and method for aligning time-series data over a large range of time indices
CN103957191A (en) Detection method for Chinese domain name spoof attack
Shang et al. A machine learning based golden-free detection method for command-activated hardware Trojan
Li et al. A self‐exciting marked point process model for drought analysis
CN108090364B (en) Method and system for positioning data leakage source
CN112464297B (en) Hardware Trojan detection method, device and storage medium
CN112380537A (en) Method, device, storage medium and electronic equipment for detecting malicious software
CN113935034A (en) Malicious code family classification method and device based on graph neural network and storage medium
Thompson Poisson distributions
CN113051601B (en) Sensitive data identification method, device, equipment and medium
KR101725450B1 (en) Reputation management system provides safety in html5 and method of the same
CN106850186A (en) The hashing algorithms of SHA 256 resist the detection method of differential fault attack
US9344277B2 (en) Mass serialization analytics
CN111756735A (en) DNS tunnel traffic detection method and device
Tupsamudre et al. POSTER: improved markov strength meters for passwords

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
RJ01 Rejection of invention patent application after publication

Application publication date: 20191022

RJ01 Rejection of invention patent application after publication