Unlock instant, AI-driven research and patent intelligence for your innovation.

Cipher traversal algorithm based on keyboard rule

A technology of traversal algorithms and rules, which is applied in the field of password encryption and decryption, and can solve problems such as the inability to use the keyboard to arrange the order, and the inability to complete the traversal of passwords

Active Publication Date: 2015-04-29
XIAMEN MEIYA PICO INFORMATION
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Ordinary brute force traversal algorithm can only substitute all possible keyboard characters for full arrangement and combination, even if the password is less than 8 digits, the traversal cannot be completed in a short time
Due to the fact that it cannot use the keyboard arrangement sequence, most of the passwords it traverses are invalid

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Cipher traversal algorithm based on keyboard rule
  • Cipher traversal algorithm based on keyboard rule
  • Cipher traversal algorithm based on keyboard rule

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] As a specific embodiment, in order to achieve the above object, the technical solution adopted by the present invention is a password traversal algorithm based on keyboard rules, including the following steps:

[0030] Step 1: Obtain the characters on the keyboard and establish a password set according to the keyboard character rules. The password set includes the first traversal character table and the second traversal character table, as shown below, Table 1 is the first traversal character table, and Table 2 is The second traverses the character table,

[0031] ` 1 2 3 4 5 6 7 8 9 0 - = q w e r t y u i o p [ ] a s d f g h j k l ; ‘ \ z x c v b n m , . /

[0032] Table 1 All characters without pressing the Shift key

[0033] ~ ! # $ % ^ & * ( ) _ + Q W E R T Y U I O P { } A S D F G H J K L : " | Z X C V B N M <

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the field of cipher encryption and decryption, in particular to a cipher traversal algorithm based on a keyboard rule. The method comprises the following steps that first, characters on a keyboard are obtained, and a cipher set is built according to a keyboard character rule; second, a violence traversal rule of the cipher set is set; third, the violence traversal rule and the cipher set are served as a data source of the traversal algorithm, and the characters in the cipher set are constructed to form final traversal ciphers by using the traversal algorithm. According to the cipher traversal algorithm based on the keyboard rule, a corresponding traversal algorithm is designed aiming at the characteristic of the keyboard rule, and the traversal on the ciphers of different keyboard orders, different initial positions and different lengths can be achieved.

Description

technical field [0001] The invention relates to the field of password encryption and decryption, in particular to a password traversal algorithm based on keyboard rules. Background technique [0002] Brute force traversal and dictionary traversal are the two most commonly used traversal methods in password recovery. Brute force traversal is to traverse all the passwords in the rules specified by the user, and dictionary traversal is to traverse the passwords in the dictionary file. The brute force method often requires more rules to cover as large a password space as possible to improve the success rate of password recovery, but too large a password space will double the traversal time, or even take hundreds of thousands of years, making password recovery meaningless. The success rate of the dictionary traversal method is often limited by the number of passwords in the dictionary. Since the number of passwords in the dictionary is generally not too many, the password traver...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/08
Inventor 张光斌王海滨张永光汤伟宾
Owner XIAMEN MEIYA PICO INFORMATION