Method for encrypting SSR password

A password and user password technology, which is applied to encryption devices with shift registers/memory and key distribution, can solve problems such as insecurity, achieve the effect of preventing brute force cracking and improving security

Inactive Publication Date: 2016-09-21
LANGCHAO ELECTRONIC INFORMATION IND CO LTD
View PDF5 Cites 5 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0002] The common encryption method is to directly generate a digest of the password MD5, which is not safe. After getting the

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Method for encrypting SSR password

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0022] A method for implementing SSR password encryption, characterized in that: the method uses salt value encryption and iteration count encryption, wherein salt value encryption refers to adding a salt value before the user password, and this value is randomly generated by the system. Only the system knows, and then MD5 encrypts the combination of the salt value and the password, so that hackers cannot determine the password even if they query the hash value dictionary; the iteration count algorithm is an iterative digest algorithm that continues to repeatedly generate the digest generated for the first time The summary is to perform count times of MD5 operations, which can effectively prevent hackers from brute force cracking. Greatly improved the security of password encryption.

Embodiment 2

[0024] Such as figure 1 As shown, on the basis of embodiment 1, the method operation steps described in this embodiment are as follows:

[0025] Step 1: Generate a salt value. There is a different salt for each user. Record the corresponding relationship between the user name and the salt in the database. Using the randomly generated salt can effectively avoid "Birthday attacks (Birthday attacks, another type commonly used by hackers) means of attack)”;

[0026] Step 2: Receive the user password, and add the salt value generated in the first step before the password;

[0027] The third step: determine the iteration count value;

[0028] Step 4: Perform MD5 operation on the salt+password generated in the second step, and repeat this operation count times.

[0029] Step 5: Store the encrypted password ciphertext.

Embodiment 3

[0031] On the basis of Embodiment 1 or 2, the count value in this embodiment is 1000, and the salt value is 80bit characters.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a method for implementing SSR password encryption. The method uses two methods of salt value encryption and iteration count encryption. The salt value encryption refers to adding a salt value before the user password. This value is randomly generated by the system. Only the system knows, and then perform MD5 encryption on the combination of the salt value and the password; the iteration count algorithm is an iterative digest algorithm, and continues to generate the digest repeatedly for the first generated digest, which is to perform count times of MD5 operations. The method of the invention can effectively prevent hackers from brute force cracking, Birthday attacks and dictionary attacks, greatly improves the security of password encryption, and the simple encryption algorithm greatly improves the security of SSR.

Description

technical field [0001] The invention relates to the technical field of computer software SSR password encryption, in particular to a method for realizing SSR password encryption based on a salt value and an iteration count algorithm. Background technique [0002] The common encryption method is to directly generate a digest of the password MD5, which is not safe. After the hacker gets the digest, he can obtain the user's password by querying the hash value dictionary (such as an MD5 password cracking website). [0003] Inspur Operating System Security Enhancement System (abbreviation: SSR) Inspur has the "operating system security enhancement system" with independent intellectual property rights, which effectively restricts and disperses the original System administrator privileges. Contents of the invention [0004] The technical problem to be solved by the present invention is: aiming at the above problems, the present invention provides a method for realizing SSR gray ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): H04L9/06H04L9/08
CPCH04L9/0869H04L9/0643H04L9/0866
Inventor 刘增辉
Owner LANGCHAO ELECTRONIC INFORMATION IND CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products