CN113139200A - Method, system, computer program and storage medium for quickly cracking password - Google Patents
Method, system, computer program and storage medium for quickly cracking password Download PDFInfo
- Publication number
- CN113139200A CN113139200A CN202110508880.3A CN202110508880A CN113139200A CN 113139200 A CN113139200 A CN 113139200A CN 202110508880 A CN202110508880 A CN 202110508880A CN 113139200 A CN113139200 A CN 113139200A
- Authority
- CN
- China
- Prior art keywords
- cracking
- password
- file
- characteristic value
- encryption characteristic
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/602—Providing cryptographic facilities or services
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/60—Protecting data
- G06F21/62—Protecting access to data via a platform, e.g. using keys or access control rules
- G06F21/6209—Protecting access to data via a platform, e.g. using keys or access control rules to a single file or object, e.g. in a secure envelope, encrypted and accessed using a key, or with access control rules appended to the object itself
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F2221/00—Indexing scheme relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/21—Indexing scheme relating to G06F21/00 and subgroups addressing additional information or applications relating to security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F2221/2107—File encryption
Landscapes
- Engineering & Computer Science (AREA)
- Theoretical Computer Science (AREA)
- Health & Medical Sciences (AREA)
- Bioethics (AREA)
- General Health & Medical Sciences (AREA)
- Computer Hardware Design (AREA)
- Computer Security & Cryptography (AREA)
- Software Systems (AREA)
- Physics & Mathematics (AREA)
- General Engineering & Computer Science (AREA)
- General Physics & Mathematics (AREA)
- Storage Device Security (AREA)
Abstract
The invention discloses a method, a system, a computer program and a storage medium for quickly cracking a password, wherein the method comprises the following steps of S1: and preprocessing the decryption target to obtain an encryption characteristic value. S2: inquiring the corresponding table of the encryption characteristic values and the cracking results, judging whether the obtained encryption characteristic values have corresponding cracking results in the corresponding table of the encryption characteristic values and the cracking results, and if so, entering step S5; if there is no corresponding cracking result, the process proceeds to step S3. S3: cracking by adopting a conventional password cracking method, and if the password is cracked successfully, entering the step S4; and if the password is not cracked, ending the whole working process. S4: and writing the password obtained by successful cracking into the corresponding table of the encryption characteristic values and the cracking results. S5: and returning the password obtained by successful cracking to the user. The invention avoids the situation that repeated tasks consume a large amount of computing power, thereby reducing the waste of computing power, time and energy as a whole and improving the success rate and efficiency of password cracking.
Description
Technical Field
The invention belongs to the field of cryptography, and particularly relates to a method, a system, a computer program and a storage medium for quickly cracking a password.
Background
Cryptography is closely related to our life, for example, setting a personal computer login password can protect our computer data security; the website data security can be protected by setting a website login password; setting a database access password can protect the data security of the database and the like. However, when the user forgets the password set by the user, password cracking software or a system is needed to restore the password, such as Hashcat, Join the Ripper, and the like.
Common password cracking methods in password cracking systems are brute force cracking and dictionary cracking. The most important disadvantage of the enumeration method for decryption is that the calculation amount is large, the decryption efficiency is not high, and if the enumeration range is too large, the decryption time is hard to bear. The dictionary cracking is used by matching the password dictionary with password cracking software, and the password dictionary comprises a plurality of habitually arranged passwords, so that the password cracking success rate and the hit rate of the password cracking software can be improved, and the password cracking time is shortened. However, when the password setting is not regular or complicated and is not contained in the password dictionary, the dictionary cracking method cannot work, and even the time required for password decoding is prolonged.
Therefore, a large amount of computing power is often required in a conventional password cracking method, some cracking tasks occupy dozens of high-performance servers for several months, and some tasks are not avoided to be repeated. No matter which type of repeated task is adopted, a great deal of computing power, time and energy are wasted when repeated cracking tasks are calculated for many times.
Disclosure of Invention
The invention aims to overcome the defects of the prior art and provides a method, a system, a computer program and a storage medium for fast cracking passwords, which can realize fast cracking when repeated password cracking tasks are executed and avoid the situation that the repeated tasks consume a large amount of computing power, thereby reducing the waste of computing power, time and energy on the whole and improving the success rate and the efficiency of cracking the passwords.
The purpose of the invention is realized by the following technical scheme:
the invention provides a quick password cracking method, which comprises the following steps:
s1: preprocessing a decryption target to obtain an encryption characteristic value;
s2: inquiring the corresponding table of the encryption characteristic values and the cracking results, judging whether the obtained encryption characteristic values have corresponding cracking results in the corresponding table of the encryption characteristic values and the cracking results, and if so, entering step S5; if no corresponding cracking result exists, the step S3 is executed; when the corresponding cracking results exist in the corresponding tables of the encryption characteristic values and the cracking results, the working process only traverses the corresponding tables of the encryption characteristic values and the cracking results, and does not execute the conventional password cracking process.
S3: cracking by adopting a conventional password cracking method, and if the password is cracked successfully, entering the step S4; if the password is not cracked, the whole working process is ended;
s4: writing the password obtained by successful cracking into an encryption characteristic value and cracking result corresponding table;
s5: and returning the password obtained by successful cracking to the user.
Further, step S1 includes the following sub-steps:
s11: judging the type of the decryption target, and if the decryption target is a characteristic value, directly entering step S2; if the decryption target is a file, the process proceeds to step S12;
s12: judging the file type, and if the file is an encrypted characteristic value file, entering step S14; if the file is not the encrypted feature value file, the process proceeds to step S13;
s13: extracting an encryption characteristic value of the file;
s14: and reading the encrypted characteristic value of the file.
Further, the method for judging the file type comprises the steps of analyzing the file header and judging according to the file suffix name.
Further, step S13 includes the following sub-steps:
s131: calling a corresponding feature extraction script according to the file type to extract features of the file, if the file is an encrypted file, obtaining an encrypted feature value after the feature value is successfully extracted, and entering the step S14; and if the file is the non-encrypted file, ending the whole working process.
Further, if the feature extraction fails, an error is reported and the whole working process is ended.
Further, after the password is cracked successfully, judging a cracking mode, and if a non-dictionary cracking mode is adopted, writing the password obtained after cracking successfully into the text dictionary. By writing the password obtained by the non-dictionary cracking mode into the text dictionary, brute force cracking is not needed when the task with different encryption characteristic values but the same password is cracked next time, and the calculation power and time are saved.
The application provides a rapid password cracking system which comprises a file type judging module, an encryption characteristic value extracting module, an encryption characteristic value reading module, an encryption characteristic value and cracking result corresponding table, a password cracking module, a password cracking and warehousing module and a result inquiring module;
the file type judging module is used for judging the type of the decryption target file;
the encrypted characteristic value extraction module is used for extracting the encrypted characteristic value of the file;
the encryption characteristic value reading module is used for reading the encryption characteristic value of the file;
the encryption characteristic value and cracking result corresponding table is used for storing a password corresponding to the encryption characteristic value;
the password cracking and entering module is used for writing the password obtained by successful cracking into the corresponding table of the encryption characteristic values and the cracking results;
the password cracking module is used for carrying out conventional password cracking on the encryption characteristic values which cannot find the corresponding password in the corresponding table of the encryption characteristic values and the cracking results;
and the result query module is used for returning the cracking result to the user.
Further, the system also comprises a text dictionary, and the password cracking and entering module is also used for writing the password obtained after the password is cracked successfully through the non-dictionary cracking mode into the text dictionary.
In another aspect, the present application provides a computer program comprising computer program instructions, wherein the program instructions, when executed by a processor, are configured to implement any one of the above methods for quick password cracking.
In another aspect, the present application provides a storage medium having computer program instructions stored thereon, wherein the program instructions, when executed by a processor, are used to implement any one of the above-mentioned methods for quick password cracking.
The invention has the beneficial effects that: by combining the established encryption characteristic value and cracking result corresponding table with a text dictionary, the task with the same encryption characteristic value and the task with the same cracking result password can be simply and efficiently cracked, the repeated tasks can be quickly cracked, the situation that the repeated tasks consume a large amount of computing power is avoided, the computing power, time and energy are integrally reduced, and the success rate and the efficiency of password cracking are improved.
Drawings
Fig. 1 is a flow chart of a method for quickly cracking a password according to an embodiment of the present invention;
fig. 2 is a working schematic diagram of a quick password cracking system according to an embodiment of the present invention.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It is to be noted that the features in the following embodiments and examples may be combined with each other without conflict.
It should be noted that, in order to make the objects, technical solutions and advantages of the embodiments of the present invention clearer, the technical solutions in the embodiments of the present invention are clearly and completely described below, and it is obvious that the described embodiments are some embodiments of the present invention, but not all embodiments.
Thus, the following detailed description of the embodiments of the present invention is not intended to limit the scope of the invention as claimed, but is merely representative of selected embodiments of the invention. All other embodiments, which can be derived by a person skilled in the art from the embodiments given herein without making any creative effort, shall fall within the protection scope of the present invention.
Example 1
Fig. 1 shows a flow chart of a method for quickly cracking a password according to the preferred embodiment, where the specific flow of the method for quickly cracking a password may be as follows:
step 1, preprocessing a target file.
Specifically, it is first determined whether the decryption target is an encrypted feature value or a file, and if the decryption target is an encrypted feature value, the process directly proceeds to step 2.
If the decryption target is a file, the file type needs to be judged. Specifically, a general file header carries file type information, and the file type can be known by analyzing the file header. It can also be judged together with the file suffix name, for example, doc is MS word of 2003 version, xlsx is MS excel of 2007 version above. If the two methods conflict, the file type obtained by analyzing the file header is used as the standard. In general, the encrypted feature value file is a txt text file, and the encrypted feature value file further includes format files such as doc, docx, xls, xlsx, and the like.
And if the file type is the encrypted characteristic value file, directly reading the encrypted characteristic value from the encrypted characteristic value file.
And if the file type is the non-encrypted characteristic value file, calling a corresponding characteristic extraction script according to the file type to extract the encrypted characteristic value of the file. If the extraction is successful, reading the encrypted characteristic value from the encrypted characteristic value extraction result; if the file is a non-encrypted file, the whole work flow is directly finished; if the extraction fails, for example, the feature extraction script makes an error during the operation, the information of 'extraction failure' and the corresponding error code are returned to the user. It should be noted that there is also a fault-tolerant mechanism, when the file is an unencrypted file, the file type may be an encrypted characteristic value file, and a misjudgment occurs in the previous step, so in this step, when the file type is an encrypted characteristic value file, the encrypted characteristic value is directly read.
Step 2, inquiring the corresponding table of the encryption characteristic values and the cracking results, judging whether the obtained encryption characteristic values have corresponding cracking results in the corresponding table of the encryption characteristic values and the cracking results, and entering step 5 if the obtained encryption characteristic values have corresponding cracking results; and if the corresponding cracking result does not exist, entering the step 3.
When the corresponding cracking results exist in the corresponding tables of the encryption characteristic values and the cracking results, the work flow only traverses the corresponding tables of the encryption characteristic values and the cracking results, and password cracking is not required to be performed in a brute force cracking or dictionary cracking mode.
And 3, conventional password cracking, creating a password cracking task according to system prompts, and issuing the task to the high-performance computing cluster through the scheduler for execution until the task is finished. If the password is successfully cracked, entering the step 4; if the password is failed to be cracked or abnormal, the whole working process is ended. When password cracking fails, an error code is returned to the user.
And 4, writing the password obtained by successful cracking into the encryption characteristic value and cracking result corresponding table, and quickly searching the password corresponding to the encryption characteristic value at the beginning of the cracking task creation if the next repeated task is a cracking task with the same encryption characteristic value, so as to realize the quick cracking of the same encryption characteristic value.
Meanwhile, after the password obtained by successful cracking is written into the encryption characteristic value and cracking result corresponding table, the method adopted by the conventional password cracking in the step 3 is judged, if a non-dictionary cracking mode is adopted, the password is written into the text dictionary, when the next repeated task is a cracking task with different encryption characteristic values but the same password, although cracking cannot be directly completed through the encryption characteristic value and cracking result corresponding table at the time to obtain the password, the password cracking task can be completed through the text dictionary more quickly than brute force cracking, and the time and the calculation force consumed in cracking the repeated task can be reduced.
And 5, returning the password obtained by successful cracking to the user. At this point the entire workflow is ended.
In the embodiment, the time-consuming comparison test is performed in the same test environment through the quick password cracking method provided by the embodiment in the conventional password cracking.
The encryption characteristic value adopted by the test is as follows:
configuration of the test environment:
the following is a comparison of the time consumed in the present invention and conventional cryptographic break using test encryption feature values in a test environment:
the comparison can show that when the password is cracked for the first time, the encryption characteristic value of the decryption target is the encryption characteristic 1, at this time, the cracking result of the encryption characteristic 1 is not recorded in the correspondence table of the encryption characteristic value and the cracking result, and the cracking password corresponding to the encryption characteristic value is not recorded in the text dictionary, which is a 'first task', so that cracking by adopting the rapid password cracking method provided by the embodiment and cracking by adopting the dictionary fail. During the second cracking, the encryption characteristic value of the decryption target is the encryption characteristic 1, the cracking is successful by adopting brute force cracking and the rapid password cracking method provided by the embodiment, and at the moment, the rapid password cracking method provided by the embodiment stores the encryption characteristic 1 and the cracking password corresponding to the encryption characteristic value into the corresponding table of the cracking result. In the third cracking, the encryption characteristic value of the decryption target is the encryption characteristic 1, the conventional password cracking mode adopts dictionary cracking, and the password is not recorded in the text dictionary, so that the cracking fails. In the fourth cracking, the encryption characteristic value of the decryption target is the encryption characteristic 1, and the brute force cracking is adopted in the conventional password cracking mode, so that the time duration is the same as that in the second cracking.
As can be seen from the above cracking of the encryption characteristic 1, when cracking tasks with the same encryption characteristic values are faced, if too many repeated tasks are performed, a conventional password cracking method is adopted, and compared with the password fast cracking method provided in this embodiment, a large amount of time and calculation power are wasted, and the overall task execution efficiency is affected.
And in the fifth cracking, the encryption characteristic value of the decryption target is the encryption characteristic 2, and the password corresponding to the encryption characteristic 2 is the same as the password corresponding to the encryption characteristic 1. Therefore, the conventional password cracking adopts a dictionary cracking mode, the corresponding password is not recorded in the conventional text dictionary, and the corresponding password cannot be found even if the conventional text dictionary is traversed, so that the cracking fails. In the sixth cracking, the encryption characteristic value of the decryption target is the encryption characteristic 2, and the conventional password cracking adopts a brute force cracking mode, so that the decryption is successful after a long time. In the seventh cracking, the password is not recorded in the conventional dictionary cracking method, but the password rapid cracking method provided by the embodiment already obtains the corresponding password when traversing the corresponding table of the encryption characteristic values and the cracking results before creating the conventional cracking task. In the eighth cracking, the conventional brute force cracking method consumes a long time again, and the rapid password cracking method provided by the embodiment already obtains the corresponding password when traversing the corresponding table of the encryption characteristic values and the cracking results before creating the conventional cracking task.
As can be seen from the above cracking of the encryption characteristics 1 and the encryption characteristics 2, when facing cracking tasks with different encryption characteristic values but the same password, the rapid password cracking method provided by the embodiment can greatly reduce the time consumed by the cracking tasks, and improve the success rate and efficiency of password cracking.
According to the rapid password cracking method provided by the embodiment, the built encryption characteristic value and cracking result corresponding table is combined with the text dictionary, so that the tasks with the same encryption characteristic value and the tasks with the same cracking result password can be simply and efficiently cracked, the repeated tasks can be rapidly cracked, the situation that the repeated tasks consume a large amount of computing power is avoided, the waste of computing power, time and energy is integrally reduced, and the success rate and the efficiency of password cracking are improved.
Example 2
As shown in fig. 2, the working schematic diagram of a password fast cracking system according to the preferred embodiment includes a file type determination module, an encryption characteristic value extraction module, an encryption characteristic value reading module, an encryption characteristic value and cracking result correspondence table, a password cracking module, a password cracking storage module, and a result query module.
The file type judging module is used for judging the type of the decryption target file; the encrypted characteristic value extraction module is used for extracting the encrypted characteristic value of the file; the encryption characteristic value reading module is used for reading the encryption characteristic value of the file; the encryption characteristic value and cracking result corresponding table is used for storing a password corresponding to the encryption characteristic value; the password cracking and entering module is used for writing the password obtained by successful cracking into the corresponding table of the encryption characteristic values and the cracking results; the password cracking module is used for carrying out conventional password cracking on the encryption characteristic values which cannot find the corresponding password in the corresponding table of the encryption characteristic values and the cracking results; and the result query module is used for returning the cracking result to the user.
The specific implementation processes of the above system and each module, and the achieved beneficial effects, may refer to the corresponding descriptions in the foregoing embodiment of the password fast cracking method, and for convenience and conciseness of description, no further description is given here.
Example 3
The preferred embodiment provides a computer program, which can implement the steps in any embodiment of the rapid password cracking method provided in the embodiments of the present application, and therefore, the beneficial effects of any rapid password cracking method provided in the embodiments of the present application can be achieved, which are detailed in the foregoing embodiments and will not be described herein again.
Example 4
It will be understood by those skilled in the art that all or part of the steps of the methods of the above embodiments may be performed by instructions or by associated hardware controlled by the instructions, which may be stored in a computer readable storage medium and loaded and executed by a processor. To this end, an embodiment of the present invention provides a storage medium, in which a plurality of instructions are stored, where the instructions can be loaded by a processor to perform the steps of any embodiment of the quick password cracking method provided in the embodiment of the present invention.
Wherein the storage medium may include: read Only Memory (ROM), Random Access Memory (RAM), magnetic or optical disks, and the like.
Since the instructions stored in the storage medium can execute the steps in any of the password quick-cracking method embodiments provided by the embodiments of the present invention, the beneficial effects that any of the password quick-cracking methods provided by the embodiments of the present invention can achieve can be achieved, which are detailed in the foregoing embodiments and will not be described herein again.
The foregoing basic embodiments of the invention and their various further alternatives can be freely combined to form multiple embodiments, all of which are contemplated and claimed herein. In the scheme of the invention, each selection example can be combined with any other basic example and selection example at will. Numerous combinations will be known to those skilled in the art.
The above description is only for the purpose of illustrating the preferred embodiments of the present invention and is not to be construed as limiting the invention, and any modifications, equivalents and improvements made within the spirit and principle of the present invention are intended to be included within the scope of the present invention.
Claims (10)
1. A quick password cracking method is characterized in that: the method comprises the following steps:
s1: preprocessing a decryption target to obtain an encryption characteristic value;
s2: inquiring the corresponding table of the encryption characteristic values and the cracking results, judging whether the obtained encryption characteristic values have corresponding cracking results in the corresponding table of the encryption characteristic values and the cracking results, and if so, entering step S5; if no corresponding cracking result exists, the step S3 is executed;
s3: cracking by adopting a conventional password cracking method, and if the password is cracked successfully, entering the step S4; if the password is not cracked, the whole working process is ended;
s4: writing the password obtained by successful cracking into an encryption characteristic value and cracking result corresponding table;
s5: and returning the password obtained by successful cracking to the user.
2. The rapid password cracking method as claimed in claim 1, wherein: the step S1 includes the following sub-steps:
s11: judging the type of the decryption target, and if the decryption target is a characteristic value, directly entering step S2; if the decryption target is a file, the process proceeds to step S12;
s12: judging the file type, and if the file is an encrypted characteristic value file, entering step S14; if the file is not the encrypted feature value file, the process proceeds to step S13;
s13: extracting an encryption characteristic value of the file;
s14: and reading the encrypted characteristic value of the file.
3. The rapid password cracking method as claimed in claim 2, wherein: the method for judging the file type comprises the steps of analyzing the file header and judging according to the suffix name of the file.
4. The rapid password cracking method as claimed in claim 2, wherein: the step S13 includes the following sub-steps:
s131: calling a corresponding feature extraction script according to the file type to extract features of the file, if the file is an encrypted file, obtaining an encrypted feature value after the feature value is successfully extracted, and entering the step S14; and if the file is the non-encrypted file, ending the whole working process.
5. The quick password cracking method as claimed in claim 4, wherein: and if the feature extraction fails, reporting an error and finishing the whole working process.
6. The rapid password cracking method as claimed in claim 1, wherein: and after the password is cracked successfully, judging a cracking mode, and if a non-dictionary cracking mode is adopted, writing the password obtained after the cracking is successful into a text dictionary.
7. A quick password cracking system is characterized in that: the system comprises a file type judgment module, an encryption characteristic value extraction module, an encryption characteristic value reading module, an encryption characteristic value and cracking result correspondence table, a password cracking module, a password cracking and warehousing module and a result query module; wherein the content of the first and second substances,
the file type judging module is used for judging the type of the decryption target file;
the encrypted characteristic value extraction module is used for extracting the encrypted characteristic value of the file;
the encryption characteristic value reading module is used for reading the encryption characteristic value of the file;
the encryption characteristic value and cracking result corresponding table is used for storing a password corresponding to the encryption characteristic value;
the password cracking and entering module is used for writing the password obtained by successful cracking into the corresponding table of the encryption characteristic values and the cracking results;
the password cracking module is used for carrying out conventional password cracking on the encryption characteristic values which cannot find the corresponding password in the corresponding table of the encryption characteristic values and the cracking results;
and the result query module is used for returning the cracking result to the user.
8. The rapid password cracking system as claimed in claim 7, wherein: the system also comprises a text dictionary, and the password cracking and entering module is also used for writing the password obtained after the password is cracked successfully through the non-dictionary cracking mode into the text dictionary.
9. A computer program comprising computer program instructions, wherein the program instructions, when executed by a processor, are adapted to implement the method of rapid password cracking of any of claims 1-6.
10. A storage medium having computer program instructions stored thereon, wherein the program instructions, when executed by a processor, are for implementing the rapid password cracking method of any one of claims 1 to 6.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110508880.3A CN113139200B (en) | 2021-05-11 | 2021-05-11 | Method, system, computer program and storage medium for quickly cracking password |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN202110508880.3A CN113139200B (en) | 2021-05-11 | 2021-05-11 | Method, system, computer program and storage medium for quickly cracking password |
Publications (2)
Publication Number | Publication Date |
---|---|
CN113139200A true CN113139200A (en) | 2021-07-20 |
CN113139200B CN113139200B (en) | 2023-01-31 |
Family
ID=76817118
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN202110508880.3A Active CN113139200B (en) | 2021-05-11 | 2021-05-11 | Method, system, computer program and storage medium for quickly cracking password |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN113139200B (en) |
Cited By (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116094733A (en) * | 2023-04-03 | 2023-05-09 | 中国电子科技集团公司第三十研究所 | Automatic cracking method and system for challenge/response identity authentication |
Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1396741A (en) * | 2002-09-02 | 2003-02-12 | 郑建德 | Public key cipher system based on classical matrix analysis |
CN101064602A (en) * | 2006-04-24 | 2007-10-31 | 北京易诚世纪科技有限公司 | Cipher inputting method and system |
CN102111418A (en) * | 2011-03-02 | 2011-06-29 | 北京工业大学 | Facial feature cryptographic key generation-based internet identity authentication method |
CN102779251A (en) * | 2012-06-29 | 2012-11-14 | 鸿富锦精密工业(深圳)有限公司 | Electronic device and encrypting/decrypting method thereof |
WO2013109330A2 (en) * | 2011-10-31 | 2013-07-25 | The Florida State University Research Foundation, Inc. | System and methods for analyzing and modifying passwords |
CN104077542A (en) * | 2014-07-10 | 2014-10-01 | 南威软件股份有限公司 | Password cracking system and method |
CN104182208A (en) * | 2014-08-08 | 2014-12-03 | 北京锐安科技有限公司 | Method and system utilizing cracking rule to crack password |
CN104217171A (en) * | 2013-05-30 | 2014-12-17 | 安世盾信息技术(北京)有限公司 | Password cracking method, device and system |
US20150067760A1 (en) * | 2013-08-28 | 2015-03-05 | Lenovo (Singapore) Pte, Ltd. | Conforming passwords to a password policy |
CN104615945A (en) * | 2015-02-04 | 2015-05-13 | 中国电子科技集团公司第三十研究所 | Code cracking method and system based on multiple GPU cracking devices |
CN105825122A (en) * | 2015-01-05 | 2016-08-03 | 中国移动通信集团广西有限公司 | Weak password verification and cracking method and device |
WO2017054444A1 (en) * | 2015-09-30 | 2017-04-06 | 深圳市先河系统技术有限公司 | System login method, server, system, and network attached storage device |
CN108377182A (en) * | 2018-01-12 | 2018-08-07 | 电子科技大学 | A kind of the RC4 stream ciphers generating means and method of high safety |
CN108416208A (en) * | 2018-02-05 | 2018-08-17 | 深圳大普微电子科技有限公司 | A kind of method of decryption, host equipment and storage device |
TWI656454B (en) * | 2017-10-27 | 2019-04-11 | 國立成功大學 | Method and system for preventing password file leakage detection |
CN111835499A (en) * | 2020-06-30 | 2020-10-27 | 中国电子科技集团公司第三十研究所 | High-performance calculation-based L2TP/IPSEC (Internet protocol Security) cracking method and system |
JP2020188321A (en) * | 2019-05-10 | 2020-11-19 | 京セラドキュメントソリューションズ株式会社 | Image processing system, image processing method, and image forming apparatus |
CN112487147A (en) * | 2020-12-02 | 2021-03-12 | 中国电子科技集团公司第三十研究所 | Automatic matching method, system, computer program and storage medium for password cracking algorithm |
CN112507347A (en) * | 2020-10-27 | 2021-03-16 | 中国科学院信息工程研究所 | Cracking job description information generation method facing distributed password cracking framework |
CN112580020A (en) * | 2020-12-23 | 2021-03-30 | 北京安信荣达科技有限公司 | IOS data extraction and password cracking device |
CN113676348A (en) * | 2021-08-04 | 2021-11-19 | 南京赋乐科技有限公司 | Network channel cracking method, device, server and storage medium |
-
2021
- 2021-05-11 CN CN202110508880.3A patent/CN113139200B/en active Active
Patent Citations (21)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN1396741A (en) * | 2002-09-02 | 2003-02-12 | 郑建德 | Public key cipher system based on classical matrix analysis |
CN101064602A (en) * | 2006-04-24 | 2007-10-31 | 北京易诚世纪科技有限公司 | Cipher inputting method and system |
CN102111418A (en) * | 2011-03-02 | 2011-06-29 | 北京工业大学 | Facial feature cryptographic key generation-based internet identity authentication method |
WO2013109330A2 (en) * | 2011-10-31 | 2013-07-25 | The Florida State University Research Foundation, Inc. | System and methods for analyzing and modifying passwords |
CN102779251A (en) * | 2012-06-29 | 2012-11-14 | 鸿富锦精密工业(深圳)有限公司 | Electronic device and encrypting/decrypting method thereof |
CN104217171A (en) * | 2013-05-30 | 2014-12-17 | 安世盾信息技术(北京)有限公司 | Password cracking method, device and system |
US20150067760A1 (en) * | 2013-08-28 | 2015-03-05 | Lenovo (Singapore) Pte, Ltd. | Conforming passwords to a password policy |
CN104077542A (en) * | 2014-07-10 | 2014-10-01 | 南威软件股份有限公司 | Password cracking system and method |
CN104182208A (en) * | 2014-08-08 | 2014-12-03 | 北京锐安科技有限公司 | Method and system utilizing cracking rule to crack password |
CN105825122A (en) * | 2015-01-05 | 2016-08-03 | 中国移动通信集团广西有限公司 | Weak password verification and cracking method and device |
CN104615945A (en) * | 2015-02-04 | 2015-05-13 | 中国电子科技集团公司第三十研究所 | Code cracking method and system based on multiple GPU cracking devices |
WO2017054444A1 (en) * | 2015-09-30 | 2017-04-06 | 深圳市先河系统技术有限公司 | System login method, server, system, and network attached storage device |
TWI656454B (en) * | 2017-10-27 | 2019-04-11 | 國立成功大學 | Method and system for preventing password file leakage detection |
CN108377182A (en) * | 2018-01-12 | 2018-08-07 | 电子科技大学 | A kind of the RC4 stream ciphers generating means and method of high safety |
CN108416208A (en) * | 2018-02-05 | 2018-08-17 | 深圳大普微电子科技有限公司 | A kind of method of decryption, host equipment and storage device |
JP2020188321A (en) * | 2019-05-10 | 2020-11-19 | 京セラドキュメントソリューションズ株式会社 | Image processing system, image processing method, and image forming apparatus |
CN111835499A (en) * | 2020-06-30 | 2020-10-27 | 中国电子科技集团公司第三十研究所 | High-performance calculation-based L2TP/IPSEC (Internet protocol Security) cracking method and system |
CN112507347A (en) * | 2020-10-27 | 2021-03-16 | 中国科学院信息工程研究所 | Cracking job description information generation method facing distributed password cracking framework |
CN112487147A (en) * | 2020-12-02 | 2021-03-12 | 中国电子科技集团公司第三十研究所 | Automatic matching method, system, computer program and storage medium for password cracking algorithm |
CN112580020A (en) * | 2020-12-23 | 2021-03-30 | 北京安信荣达科技有限公司 | IOS data extraction and password cracking device |
CN113676348A (en) * | 2021-08-04 | 2021-11-19 | 南京赋乐科技有限公司 | Network channel cracking method, device, server and storage medium |
Non-Patent Citations (3)
Title |
---|
张小飞等: "不可逆加密算法和随机算法的分析与实现", 《信息网络安全》 * |
李翔豪等: "SOHO路由器脆弱性的分析和验证", 《信息安全与通信保密》 * |
王岁花等: "基于.NET的分布式系统用户密码加密方案设计", 《信阳师范学院学报(自然科学版)》 * |
Cited By (2)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN116094733A (en) * | 2023-04-03 | 2023-05-09 | 中国电子科技集团公司第三十研究所 | Automatic cracking method and system for challenge/response identity authentication |
CN116094733B (en) * | 2023-04-03 | 2023-08-22 | 中国电子科技集团公司第三十研究所 | Automatic cracking method and system for challenge/response identity authentication |
Also Published As
Publication number | Publication date |
---|---|
CN113139200B (en) | 2023-01-31 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Sun et al. | SigPID: significant permission identification for android malware detection | |
US8458186B2 (en) | Systems and methods for processing and managing object-related data for use by a plurality of applications | |
US20170249345A1 (en) | A biomolecule based data storage system | |
US20050210054A1 (en) | Information management system | |
CN103942292A (en) | Virtual machine mirror image document processing method, device and system | |
US9721114B2 (en) | Automatic resource ownership assignment system and method | |
US9971809B1 (en) | Systems and methods for searching unstructured documents for structured data | |
US11042507B2 (en) | System and method of deletion of files and counteracting their restoration | |
CN113139200B (en) | Method, system, computer program and storage medium for quickly cracking password | |
CN112559386A (en) | Method and device for improving SSD performance, computer equipment and storage medium | |
US20090299935A1 (en) | Method and apparatus for digital forensics | |
KR20220088958A (en) | Systems and methods for managing connections in a scalable cluster | |
US10311021B1 (en) | Systems and methods for indexing backup file metadata | |
CN111209608A (en) | Big data storage system | |
CN107016296B (en) | Data index construction method, data index reading method, data index construction device, data reading device and electronic equipment | |
CN116010926A (en) | Login authentication method, login authentication device, computer equipment and storage medium | |
CN115618379A (en) | HBase database-oriented multi-granularity data transparent encryption and decryption method and system | |
CN114461762A (en) | Archive change identification method, device, equipment and storage medium | |
US9600508B1 (en) | Data layer service availability | |
US12013943B2 (en) | Data processing system and method capable of separating application processes | |
CN113591157B (en) | Access encrypted database detection method, terminal device and storage medium | |
US20230344844A1 (en) | Methods and systems for anomalous operation detection on an enterprise server | |
CN117311916B (en) | Data processing method, system, device and storage medium for identity authentication | |
US20230342783A1 (en) | Methods and systems for anomalous operation detection on a consumer device | |
US20090138523A1 (en) | Content engine asynchronous upgrade framework |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
PB01 | Publication | ||
PB01 | Publication | ||
SE01 | Entry into force of request for substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant |