New password authentication method and device

An authentication method and a technology of an authentication device, which are applied in the field of information network security, can solve problems such as the real-time effect of decryption, and achieve the effects of protecting security, increasing random characteristics, and high security.

Active Publication Date: 2011-05-04
XIAMEN MEIYA PICO INFORMATION
View PDF5 Cites 10 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0008] The file compression software WinRAR is another typical example of increasing software security by increasing the number of hash rounds. Alth

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • New password authentication method and device
  • New password authentication method and device
  • New password authentication method and device

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0044] see figure 1 Shown, a kind of new password authentication method of the present invention comprises:

[0045] Step 1, receiving the input original password;

[0046] Step 2, generate a random value, which is customarily called the Salt value in password science;

[0047] In this step, a random Salt value is generated to ensure that even with the same password and the same data, the encrypted data output at different times is different, increasing the randomness of the method.

[0048] Step 3, according to the random value Salt value and the original password (Password), generate the initial key Hash through the hash algorithm 0 ;

[0049] In this step, the random value Salt value and the original password (Password) are input, and one of the existing hash algorithms is selected as the default hash algorithm H 0 , H 0 It can be MD5, SHA1, RIPEMD160 and other algorithms. Specifically: Hash 0 =H 0 (salt+password); remember Hash 0 The size is L 0 bytes.

[0050] ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a new password authentication method, which comprises the following steps of: receiving an input original password; generating a random Salt value; generating an initial key Hash0 by a Hash algorithm according to the random Salt value and the original password, wherein Hash0 = H0 (salt + password) and the magnitude of the Hash0 is L0 bytes; converting the Hash0 through a character string, and generating an initial key vector D, wherein the magnitude of the Hash0 is L0 bytes and D is 4-dimensional vector array [x, y, z, w] with magnitude of 2*L0 bytes; initializing a key Box by hybrid logic filling according to the initial key Hash0; generating a new key vector D' by logical operation according to the initialized key Box and the initial key vector D; and taking the new key vector D' as a final key. The method has extremely high security, overcomes the security defect of current software encryption, can resist violent password resolution, and can effectively protect the security of user password and data.

Description

technical field [0001] The invention relates to the technical field of information network security, in particular to a new password authentication method and device. Background technique [0002] Information security refers to protecting information and resources, protecting users and their privacy by protecting applications, data or equipment from unauthorized access or use, and ensuring that applications and data are protected under various attacks. Security during transmission. As the most basic and important link of information security, data security has always been the focus of attention. The loss of important information will bring losses to individuals and enterprises, so it is of great significance to encrypt important information. With the continuous improvement of information security requirements, various password encryption algorithms emerge in an endless stream, such as DES, etc., combined with irreversible hash algorithms to generate encryption keys, such a...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/32
Inventor 汤伟宾张永光张雪峰
Owner XIAMEN MEIYA PICO INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products