Method and system for obtaining target password rule set in exhaustion-method decryption

An acquisition method and technology of exhaustive method, applied in the field of target password rule set acquisition in exhaustive method decryption, can solve problems such as low efficiency, achieve the effect of improving efficiency and reducing the number of attempted passwords

Inactive Publication Date: 2017-04-05
广东省信息安全测评中心 +1
View PDF2 Cites 7 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] Based on this, it is necessary to provide a method and system for obtaining a target password rule set that can effectively improve the decryption efficiency of the brute force method in view of the low efficiency of the general brute force method decryption method

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method and system for obtaining target password rule set in exhaustion-method decryption
  • Method and system for obtaining target password rule set in exhaustion-method decryption
  • Method and system for obtaining target password rule set in exhaustion-method decryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0023] like figure 1 As shown, a method for obtaining the target password rule set in the exhaustive method decryption, including steps:

[0024] S200: Obtain a public password database.

[0025] The public password database can be obtained based on historical experience data, for example, by making full use of big data, cloud data, and the Internet, passwords formed in different parts of the world, different regions, different countries, different nationalities, and different cultural backgrounds can be obtained. Specifically, a preliminary classification and analysis of the public password database can also be carried out here, specifically, the public passwords can be classified according to regions, and the public passwords can be classified according to languages. More specifically, the public password database can include the domestic 163 mailbox database, csdn forum database, Tianya forum database, qq account database, weibo account database, foreign yahoo mailbox data...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a method and system for obtaining a target password rule set in exhaustion-method decryption. A public password library is obtained; a data analysis is carried out on the public password library and analysis and statistic processing is carried out on password rules to obtain a password rule library; the password rule probability of each password rule in the password rule library is analyzed, password sorting in the password rule library is carried out based on the password rule probability, thereby obtaining a sorted password rule library; and a target password requirement is analyzed and the sorted password rule library is filtered to obtain a target password rule set. During the whole process, the password rule is analyzed based on the psychology and social engineering; and the target password rule set is determined by means of probability-based statistic sorting and filtering. Therefore, the number of passwords needed to be tried in exhaustion-method decryption can be reduced substantially, so that the efficiency of the exhaustion-method decryption can be improved substantially.

Description

technical field [0001] The present invention relates to the technical field of decryption, in particular to a method and system for acquiring a target password rule set in exhaustive method decryption. Background technique [0002] Common methods for cracking passwords include brute force methods. Specifically, the basic idea of ​​the exhaustive method is to determine the approximate range of the answer according to some conditions of the question, and verify all possible situations one by one within this range until all the situations are verified. If a certain situation is verified to meet all the conditions of the topic, it is a solution to this problem; if all the conditions of the topic are not met after verification, then there is no solution to this problem. The exhaustive method is also called the enumeration method. [0003] The exhaustive method is a method for deciphering passwords. This method is very similar to the "complete induction" in mathematics and has ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/00
CPCH04L9/3226H04L9/002
Inventor 黄胜葛鑫
Owner 广东省信息安全测评中心
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products