Password cracking effect evaluation method and device, electronic equipment and storage medium

A password and evaluation value technology, applied in the field of password cracking, can solve problems such as information leakage

Inactive Publication Date: 2021-07-09
CHINA ELECTRONICS CORP 6TH RES INST
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although the Internet brings convenience to people, its security problems are becoming more and more prominent, making people suffer from major risks of information leakage

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password cracking effect evaluation method and device, electronic equipment and storage medium
  • Password cracking effect evaluation method and device, electronic equipment and storage medium
  • Password cracking effect evaluation method and device, electronic equipment and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0030] In order to achieve a reasonable evaluation of the effect of password cracking, a method for evaluating the effect of password cracking is provided in the embodiment of the present application.

[0031] In order to realize the effect evaluation of password cracking, an evaluation system is provided in the embodiment of this application, which can be found in figure 1 As shown, it includes data source layer, index layer and atomic function layer. Through the data of the data source layer, the determination of each index of the index layer is realized, and then the effect evaluation of the atomic function layer is realized based on the index layer, and finally the overall effect evaluation of the entire password cracking process is realized based on the effect evaluation of the atomic function layer.

[0032] exist figure 1 Based on the evaluation system shown, see figure 2 as shown, figure 2 It is a schematic flow chart of the password cracking effect evaluation met...

Embodiment 2

[0074] Based on the first embodiment, this embodiment takes a specific password cracking evaluation system and the process of using the password cracking evaluation system to evaluate the effect of password cracking as an example to further illustrate this application.

[0075] In this embodiment, the password cracking evaluation system can be found in image 3 shown.

[0076] When evaluating the password cracking effect for a password cracking process of a password cracking program, first follow the image 3 The data specified in the data source layer shown in the figure obtains the target system password cracking start time, the target system password cracking end time, the target system original password set), whether the system password is encrypted, the target database password cracking start time, the target database password cracking end time, the target database original password set, the target database password cracking result at the end of the cracking (the success...

Embodiment 3

[0115] Based on the same inventive concept, the embodiment of the present application also provides a password cracking effect evaluation device 100 . see Figure 4 as shown, Figure 4 shows the use of figure 2 As for the password cracking effect evaluation device of the shown method, it should be understood that the specific functions of the device 100 can refer to the above description, and to avoid repetition, the detailed description is appropriately omitted here. The device 100 includes at least one software function module that can be stored in a memory in the form of software or firmware or solidified in an operating system of the device 100 . specifically:

[0116] see Figure 4 As shown, the device 100 includes: an acquisition module 101 , a calculation module 102 and an evaluation module 103 . in:

[0117] The obtaining module 101 is used to obtain password cracking data generated when the password cracking program cracks each target password this time;

[01...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a password cracking effect evaluation method and device, electronic equipment and a storage medium. The method comprises the steps of obtaining password cracking data generated when a password cracking program cracks each target password at this time; according to the password cracking data of each target password, respectively calculating and obtaining an index value of a basic index of each target password; according to the index value of the basic index of each target password, calculating a cracking effect evaluation value of the password cracking program on each target password; and based on the cracking effect evaluation value corresponding to each target password, determining the password cracking effect. Therefore, the cracking effect of the password cracking program on each target password is integrated, the evaluation of the cracking effect of the password cracking program from different aspects is realized, the evaluation result is more reasonable and credible, and reasonable and reliable reference information is provided for the development of a security policy and the test of password security.

Description

technical field [0001] The present application relates to the technical field of password cracking, in particular, to a password cracking effect evaluation method, device, electronic equipment and storage medium. Background technique [0002] With the continuous and rapid development of communication technology and mobile Internet technology, the scope of business involved is more and more extensive, and the network plays an indispensable role in people's work and life. Although the Internet has brought convenience to people, its security problems have become increasingly prominent, making people suffer from major risks of information leakage. [0003] At present, the most commonly used security measures are to set passwords to identify and authenticate visitors. Cracking passwords is one of the important ways for hackers to obtain information. Password cracking is a double-edged sword. It is not only a tool for cracking passwords, but also a testing tool for password secur...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 张尼刘桐菊李维皓朱广宇卢凯于增明李霄野
Owner CHINA ELECTRONICS CORP 6TH RES INST
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products