Password traversal method and device
A password and traversal technology, applied in the field of password encryption and decryption, which can solve the problem that the password cannot be traversed first.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0053] like figure 1 As shown, this embodiment provides a password traversal method, which includes the following steps S302 to S306.
[0054] Step S302: Obtain a preset character set for password traversal.
[0055] When performing password traversal, it is necessary to use the characters in the character set to construct each character of the traversal password. Therefore, at the beginning of the password traversal, step S302 is first performed to obtain a preset character set, such as the obtained preset character set It is a character set consisting of ten numbers from 0 to 9 and 26 lowercase letters from a to z.
[0056] Step S304: Obtain the probability factor set and correlation factor set corresponding to the preset character set.
[0057] Wherein, the probability factor set includes the probability factor α of each character in the preset character set corresponding to each bit of the password, specifically as defined above. The correlation factor set includes the ...
Embodiment 2
[0062] like figure 2 As shown, this embodiment provides a more preferred password traversal method, which includes the following steps S102 to S112.
[0063] Step S102: Obtain a preset character set for password traversal.
[0064]When performing password traversal, characters in the character set are used to construct each character of the traversal password. Therefore, at the beginning of password traversal, a character set is obtained first. A character set composed of 26 lowercase letters including numbers and a to z.
[0065] Step S104: Obtain the probability factor of each character in the preset character set corresponding to each digit of the password, and the correlation factor of any two characters in the preset character set.
[0066] For example, according to the research results of social engineering, it is possible to determine the probability factor of any existing character corresponding to each digit of the password, and generate a probability factor table ...
Embodiment 3
[0085] like image 3 As shown, this embodiment provides a more preferred password traversal method, which includes the following steps S202 to S218.
[0086] Step S202: Obtain a preset character set for password traversal.
[0087] Step S204: Obtain the probability factor of each character in the preset character set corresponding to each digit of the password, and the correlation factor of any two characters in the preset character set.
[0088] Step S206: Start password traversal to obtain the first password traversed.
[0089] Specifically, this step S206 may include the following steps:
[0090] a: For any character in the preset character set, calculate the occurrence probability of the character in the first digit of the password according to the probability factor of the character corresponding to the first digit of the password, so as to obtain the occurrence probability of each character in the preset character set in the first digit of the password;
[0091] b: Us...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


