Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

40 results about "Collision attack" patented technology

In cryptography, a collision attack on a cryptographic hash tries to find two inputs producing the same hash value, i.e. a hash collision. This is in contrast to a preimage attack where a specific target hash value is specified.

Method, system and server for authenticating identities on basis of block chain networks

The invention discloses a method, a system, a server and terminal equipment for authenticating identities on the basis of block chain networks. The method, the system, the server and the terminal equipment are used for authenticating the identities for nodes in the block chain networks. The method includes receiving login requests with user names; acquiring first block chain account addresses according to preliminarily stored corresponding relations between the user names and the first block chain account addresses; judging whether first transaction of payment from the first block chain account addresses to preset second block chain account addresses is available in block chains or not; determining that the identities of users are successfully authenticated if the first transaction is available in the block chains. The login requests are transmitted by the nodes. The first block chain account addresses are associated with the user names. The method, the system, the server and the terminal equipment have the advantages that transaction information stored in the block chains cannot be tampered and can be traced back and queried, and accordingly the authentication safety and the credibility of authentication procedures can be improved; the users do not need to input passwords during login and do not need to remember the passwords, accordingly, the convenience can be improved, and database collision attack due to the fact that other malicious personnel log in other websites by the aid of stolen user names and passwords can be prevented.
Owner:JIANGSU PAYEGIS TECH CO LTD

Base collision attack detecting method and system

The invention discloses a base collision attack detecting method and system. The method includes the following steps: receiving a network access request of a user and analyzing the network access request to determine an source IP, a target IP, login attribute information and user information; configuring a preset login route and a login times threshold or preset format and a login times threshold of a system default built-in login route; conducting identification to determine whether to conduct login operation according to the target IP, the login attribute information and the preset format of the preset login route or the login route, on yes judgment, recording the source IP, the target IP and user information; recording the times of login that servers of the same target IP receives identical source IP but different user information in the preset time, judging if the times of login reach the login times threshold, on yes judgment, assuming the base collision attack behavior, on no judgment, assuming normal access behavior. The method and system can monitor the base collision attack behavior to improve user information safety and avoid poor result caused by user information leakage.
Owner:SANGFOR TECH INC

Method and device for detecting database collision attack

The invention provides a method and a device for detecting a database collision attack. The method comprises the steps of: acquiring source IP addresses and login information of login requests received within a predetermined time; determining a source IP address having high-frequency login behavior among the acquired source IP addresses according to the acquired source IP addresses and login information; and judging whether the login request initiated by the source IP address having high-frequency login behavior within the predetermined time is a database collision attack according to a proportion of passwords with semantic meanings in passwords used by the login request initiated by the source IP address, wherein the passwords with semantic meanings are passwords with the probability that the passwords have semantic meanings exceeding a predetermined probability threshold value. The method and the device provided by the invention improve the precision of database collision attack detection.
Owner:ALIBABA GRP HLDG LTD

Multi-factor identity authentication method for preventing library collision attacks

ActiveCN105187382AAvoid Credential Stuffing AttacksImprove verification capabilitiesTransmissionBrute forcePassword
The invention discloses a multi-factor identity authentication method for preventing library collision attacks, which is mainly used for solving the problem that user passwords in the existing website login systems are vulnerable to brute force attacks and library collision attacks. The multiple factors in the multi-factor identity authentication method disclosed by the invention comprises a user password, a mobile phone and a bracelet, which are indispensable to complete the security authentication of user identity. The multi-factor identity authentication method comprises the steps of: (1) a user uses a short password to generate an original master key through a termination key derivation function and processes the original master key for twice in combination with two random numbers related to the bracelet and the mobile phone respectively to generate a server storage password, and stores the server storage password in a server; (2) the user successively derives the original master key and two different random numbers in combination with the bracelet and the mobile phone factors to generate the server storage password; and (3) the user uses the server storage password to carry out mutual authentication with the server. The multiple factors in the multi-factor identity authentication method disclosed by the invention is used for generating different original master keys for different websites and providing security protection to effectively avoid the risk that a single password is vulnerable to embezzlement for identity camouflage.
Owner:XIDIAN UNIV

Database collision attack monitoring method, device and system and computer storage medium

The embodiment of the invention discloses a database collision attack monitoring method. The method comprises the steps of obtaining login information of a user login behavior; calculating a databasecollision attack risk value corresponding to at least one user behavior factor according to the login information of the user login behavior; determining a database collision attack risk value of thecurrent login behavior of the user according to the database collision attack risk value corresponding to the at least one user behavior factor; and positioning a database collision attack risk type of the current login behavior of the user according to the database collision attack risk value of the current login behavior of the user. The embodiment of the invention further discloses a database collision attack monitoring device and system and a computer storage medium.
Owner:CHINA MOBILE COMM GRP CO LTD

Method for constructing reinforced hash function based on compression function

The invention belongs to the field of information safety, in particular to the cryptology field, and relates to a method for reinforcing a hash function based on a compression function. The method is used for reinforcing key loops of the hash function, namely reinforcing a first group of the compression function and a final group of the compression function, and increasing the operations of multiple bits or utilizing a present safety group code algorithm by aiming at a majority of operations of a present hash function based on a single bit. The method comprises the following steps of: reinforcing by taking a method of resisting a current differential code analysis and the like as the principal method, also considering about some other attacks, such as a second preimage attack, further adding an input variable in the input of the final group of the compression function, namely a simple compression manner of all group information. The reinforcing method disclosed by the invention has the advantages that when key groups are reinforced, the increase of calculated amount is not large along with the increase of the length of a plaintext; and the decoding obstacle is configured through the most key position, the preimage attack, collision attack, the second preimage attack and the like can be effectively resisted.
Owner:GUILIN UNIV OF ELECTRONIC TECH

Construction method of strong anti-collision chameleon hash function

The invention discloses a construction method of a strong anti-collision chameleon hash function, which comprises the following steps of S1, inputting a security parameter n, and generating public andprivate key pairs (PK, SK) by a system, the public key PK being capable of specifying a message space M, a random space R and a chameleon hash function range Y; and S2, inputting the public key PK generated by the KGen and a message m Epsilon M, Hash algorithm outputting Hash y Epsilon Y and random r Epsilon R; and S3, inputting a public key PK, and outputting b belongs to {0, 1} through a Hash Epsilon Y of the message m Epsilon M and a random vector r Epsilon R check algorithm, if b = 1, then (y, r) is a valid hash of the message m, otherwise is invalid; and S4, inputting a private key SK, amessage m Epsilon M and a corresponding Hash random pair (y, r), and a new message m' Epsilon M to output a random vector r' satisfying HCheck (PK, m', y, r ') = 1. The invention also discloses a verification method of the strong anti-collision chameleon hash function. The method can resist strong anti-collision attacks and can be well applied to the scene of a high-security chameleon hash function.
Owner:ANHUI UNIVERSITY

New method and system for selecting plaintext combined attack by CRT-RSA

The invention belongs to the field of information security, and discloses a new method and system for selecting a plaintext combined attack by CRT-RSA. In the attack process, the dp and dq of the CRT-RSA algorithm are used as targets, and then the private key parameters p, q are derived; during the plaintext collision attack process, multiple sets of plaintext pairs are selected and superimposed,and the modular multiplication power consumption difference is subjected to secondary treatment as the collision classification set; in the attack process, combined with the access number power consumption power exponent Hamming weight information leakage in the CRT-RSA modular power exponentiation process, the modular multiplication power segmentation is performed, and the plaintext collision attack is selected by segments. The invention combines other information leakage in the process of CRT-RSA modular exponentiation (such as access number power consumption power exponent Hamming weight information leakage), performs modular multiplication power segmentation, implements segmented selection of plaintext collision attacks, and can avoid local collision attack errors, which improves the attack accuracy. Finally, the private key parameters p, q are derived, and the private key d value is restored.
Owner:CHENGDU UNIV OF INFORMATION TECH

Data tamper-proofing method and system

InactiveCN106570423APrevent Collision AttacksStop falsified dataDigital data protectionTamper resistanceThird party
The invention discloses a data tamper-proofing method comprising the following steps of after original data information is segmented before sending, hashing the segmented information by using a pre-stored hash function to acquire an original data information verification string; synchronously sending the original data and the original data information verification string when in sending, synchronously receiving the sent data information and original data information verification string when in receiving; after the data information and the original data information verification string are received, segmenting the received data information, and then hashing the segmented information by using the pre-stored hash function to acquire a received data information verification string; and judging whether the received data information verification string is accordant with the original data information verification string by comparison, if yes, determining that the received data information is not tampered, and otherwise, determining that the received data information is tampered. The invention also provides a data tamper-proofing system. According to the method and the system provided by the invention, the difficulty of tampering the data by a third party is greatly increased, a collision attack from the third party with the aid of a rainbow table is effectively prevented, data falsification of a user is prevented, and data transmission security is ensured.
Owner:PHICOMM (SHANGHAI) CO LTD

Dynamic data protection method and device for preventing database collision attacks

The invention relates to a dynamic data protection method and device for preventing database collision attack. The method comprises the steps of changing a database storage structure for storing authentication information into double tables from a single table; isolating and obfuscating the public attribute and the authentication secret attribute of the authentication entity, wherein the authentication entity public attribute table does not contain any field associated with the authentication secret attribute table, and a main key of the authentication secret attribute table is a dynamic hashvalue; inquiring the database double tables when an application system carries out authentication, and calculating an authentication entity public attribute hash value corresponding to the authentication entity public attribute dynamically. The safety protection device based on the method is deployed at the front end of a database and maintains the updating and calculation query of double tables.According to the present invention, the traditional mode of strong association and static binding of authentication public attributes and authentication secret attributes is changed, a data protectiontechnology of sensitive attribute separation and dynamic updating is provided, the authentication record information of a database is differentiated, the influence of database leakage on database collision attack is reduced to the maximum extent, and the safety of a website and an authentication system is guaranteed.
Owner:中科天御(苏州)科技有限公司

Password verification method and system for preventing library collision attack, middleware and storage medium

InactiveCN110086621AReduce the risk of credential stuffing attacksSave the trouble of preventing credential stuffing attacksKey distribution for secure communicationPublic key for secure communicationApplication serverValidation methods
The invention relates to a password verification method and system for preventing library collision attack, a middleware and a storage medium. The password verification method comprises the followingsteps of decomposing a user password PW into two mutually associated login random factors, and carrying out password verification on the two login random factors and the user registration informationgenerated by registration in combination with a user identity identifier IDu, wherein the user registration information comprises the user identity identifier IDu and two mutually associated registration random factors decomposed from the user password PW. The basic design idea of the password verification method is that a password inputted by a user is decomposed into two random factors, and thetwo random factors and the server are subjected to password verification, so that the risk that a user uses the same password on different application servers to suffer from library collision attacksis reduced, the trouble that the user uses different passwords to prevent library collision attacks is omitted, and therefore the method is more convenient, practical and safer.
Owner:中科赛诺(北京)科技有限公司

Plaintext selection related collision attack method based on mask SM4 cryptographic algorithm

PendingCN111030820AReduce encryption timesThe minimum number of encryption times is reducedMultiple keys/algorithms usageEncryption apparatus with shift registers/memoriesPlaintextAlgorithm
The invention relates to the field of side channel attacks, and discloses a plaintext selection related collision attack method based on a mask SM4 cryptographic algorithm. The method comprises a measurement stage and a collision detection stage; in the measurement stage, an attacker performs encryption operation on cryptographic equipment by selecting an input plaintext, records and collects a corresponding energy trace for use in the collision detection stage; in the collision detection stage, the attacker performs correlation calculation according to the collected energy traces and based onthe energy traces corresponding to the two collision bytes, so that the input difference of the collision bytes is determined; four round secret keys are obtained after obtaining the input differenceamong the four bytes, namely the round secret key information of the first round; and then the attack method is repeatedly performed, and round keys of the second round, the third round and the fourth round are sequentially solved; and finally an original 128-bit key is reversely deduced through a key expansion algorithm. According to the method, the encryption frequency required by collision isreduced, and the algorithm attack on the mask SM4 is realized.
Owner:成都三零嘉微电子有限公司

A crt-rsa chosen plaintext joint attack method and system

The invention belongs to the field of information security, and discloses a CRT-RSA selected plaintext joint attack method and system. During the attack process, the d p and d q As the attack target, then derive the private key parameters p, q; in the plaintext collision attack process, select multiple sets of plaintext pairs, superimpose them, and do secondary processing on the power consumption difference of the model multiplication as a collision classification set; in the attack process, Combined with the disclosure of the Hamming weight information of the access number power consumption exponent during the CRT-RSA modular exponentiation operation, the modular multiplication power consumption is segmented, and the segmented plaintext collision attack is implemented. The present invention combines the problems of other information leaks (such as access number power consumption exponent Hamming weight information leak) in the CRT-RSA modular exponentiation process, performs modular multiplication power consumption segmentation, and implements segmentation selection plaintext collision attacks, which can avoid partial The collision attack is wrong, thereby improving the attack accuracy, and finally deriving the private key parameters p, q, and recovering the private key d value.
Owner:CHENGDU UNIV OF INFORMATION TECH

An encryption method and device

The present invention provides an encryption method and apparatus. The objective of the invention is to solve the problem that an encryption mode in the prior art may reduce the security of stored standard passwords. The method includes the following steps that: a plaintext character string is acquired; the acquired plaintext character string is encrypted through adopting at least two kinds of encryption algorithms, so that at least two corresponding ciphertext character strings can be obtained; characters are intercepted from each kind of obtained ciphertext character strings; and the encryption result of encryption performed on the plaintext character string can be obtained according to the intercepted characters. The encryption result obtained by using the above method contains the ciphertext character strings obtained after the encryption is performed with the different encryption algorithms, and the ciphertext character strings contained in the encryption result are not complete ciphertext character strings, but the incomplete intercepted character strings, and therefore, the encryption method can assist in effectively preventing the encryption result from being subjected to collision attack, violent attack or rainbow table comparison attack compared with an encryption method according to which a single encryption algorithm is adopted to perform encryption to obtain complete ciphertext character strings, and therefore, the security of the encryption result can be improved.
Owner:ADVANCED NEW TECH CO LTD

Identity authentication method, system and server based on blockchain network

The invention discloses a method, a system, a server and terminal equipment for authenticating identities on the basis of block chain networks. The method, the system, the server and the terminal equipment are used for authenticating the identities for nodes in the block chain networks. The method includes receiving login requests with user names; acquiring first block chain account addresses according to preliminarily stored corresponding relations between the user names and the first block chain account addresses; judging whether first transaction of payment from the first block chain account addresses to preset second block chain account addresses is available in block chains or not; determining that the identities of users are successfully authenticated if the first transaction is available in the block chains. The login requests are transmitted by the nodes. The first block chain account addresses are associated with the user names. The method, the system, the server and the terminal equipment have the advantages that transaction information stored in the block chains cannot be tampered and can be traced back and queried, and accordingly the authentication safety and the credibility of authentication procedures can be improved; the users do not need to input passwords during login and do not need to remember the passwords, accordingly, the convenience can be improved, and database collision attack due to the fact that other malicious personnel log in other websites by the aid of stolen user names and passwords can be prevented.
Owner:JIANGSU PAYEGIS TECH CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products