Password encryption method for social website

An encryption method and technology for social networking sites, applied in the field of password encryption, can solve problems such as the reduction of user password security, and achieve the effects of increasing difficulty, reducing logic, and increasing security

Inactive Publication Date: 2012-10-03
SHANGHAI PORT BUSINESS CONSULTING
View PDF8 Cites 4 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Although encryption using MD5 method is irreversible, hackers now have a large amount of MD5 original text/cipher text comparison database, which can quickly decipher the MD5

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password encryption method for social website

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0035] Example 1.

[0036] A password encryption method for social networking sites, such as figure 1 As shown, including the following steps:

[0037] A. The client communicates with the server to generate the key X, and then the client uses the key X and the password entered by the user to generate the additional key Y, and uses the key X and the additional key Y to strongly confuse the password entered by the user to generate Messy ciphertext a;

[0038] B. The client performs the first non-linear and irreversible encryption of the disordered ciphertext a to generate the intermediate ciphertext b;

[0039] C. The client performs the second non-linear and irreversible encryption of the intermediate ciphertext b to generate the final ciphertext c;

[0040] D. The client sends the key X, the additional key Y and the final cipher text c to the server, and the server stores the key X, the additional key Y and the final cipher text c.

[0041] Step A specifically is:

[0042] After the cli...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a password encryption method for a social website. A password character string is subjected to strong disturbance before the conventional message-digest algorithm 5 (MD5) encryption is performed, so that the logicality of the encrypted character string is greatly reduced. Crypt encryption processing is performed before MD5 encryption is performed, so that the original text subjected to MD5 encryption is a character string without logical relationship. Hacker needs brand new original text/ciphertext control database which does not exist at present and has huge data to decipher the ciphertext, so the difficulty of ciphertext decipher by the hacker is greatly increased and the safety of the password is improved. The encryption flow is completely performed on the client side and the password character string input by a user does not pass through a server completely, therefore, even if the hacker breaks the firewall of the server, the hacker can only find the secret key and the ciphertext and cannot find the trace of the password character string, and the safety of the password is improved.

Description

technical field [0001] The invention relates to a password encryption method, in particular to a password encryption method for social networking sites. Background technique [0002] The full name of MD5 is Message-Digest Algorithm 5, which was invented by MIT's Computer Science Laboratory and RSA Data Security Inc in the early 1990s. MD5 transforms a string of any length into a 128-bit large integer, and is an irreversible string conversion method. MD5 encryption module is a module with MD5 encryption function. [0003] Existing social networking sites usually encrypt passwords directly using the MD5 method. Although encryption using MD5 method is irreversible, hackers now have a large amount of MD5 original text / cipher text comparison database, which can quickly decipher the MD5 cipher text of commonly used passwords, and the passwords of users in social networking sites are basically common passwords. The security of the user password is greatly reduced. Contents of ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/08H04L29/06
Inventor 陈佳利
Owner SHANGHAI PORT BUSINESS CONSULTING
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products