Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

PPTP VPN password verification method and computer readable storage medium

A password verification and password technology, which is applied in the field of encryption, can solve the problem of increasing the geometric progression of the traversal time, and achieve the effect of reducing the traversal time and improving the verification efficiency

Active Publication Date: 2018-01-09
XIAMEN MEIYA PICO INFORMATION
View PDF4 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

How to improve the efficiency of PPTP VPN password verification is the current main research direction. The current research mainly focuses on improving the speed of brute force traversal through various hardware acceleration, algorithm optimization, and distributed technologies to shorten the traversal time. However, through The method of improving the traversal speed can only make the single traversal time decrease linearly, and for a large number of PPTPVPN password information on the network, even for the same user, the ChallengeResponse and ChallengeHash values ​​generated due to the different random codes are different each time they log in. To complete the verification of a large number of PPTP VPN passwords will increase the traversal time geometrically

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • PPTP VPN password verification method and computer readable storage medium
  • PPTP VPN password verification method and computer readable storage medium
  • PPTP VPN password verification method and computer readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0082] Please refer to figure 1 , Embodiment one of the present invention is: a kind of PPTP VPN password verification method, comprises the steps:

[0083] S1: Obtain the authentication Hash value and the authentication response value of the PPTP VPN password; from the plaintext information of the PPTP VPN password communication message, the authentication response value (ChallengeResponse) of 24 bytes can be obtained directly and the authentication Hash value (ChallengeResponse) of 20 bytes can be indirectly calculated ( ChallengeHash).

[0084] S2: According to the value of the lower 8 bytes of the authentication Hash value and the value of the upper 8 bytes of the authentication response value, through brute force traversal, obtain the upper 2 characters of the NTHash value corresponding to the authentication Hash value and the authentication response value The value of the section; since the high-order 2 bytes of the NTHash value are used as an encryption key after a spe...

Embodiment 2

[0110] This embodiment is a further extension of steps S3, S5 and S6 in the first embodiment.

[0111] Such as Figure 4 As shown, the step S3 includes the following steps:

[0112] S301: Construct a first index table, a second index table, and a third index table, where the index addresses in the first index table and the second index table are first index addresses, and the values ​​of the first index addresses are respectively 0 -65535, the index address in the third index table is the second index address.

[0113] S302: Store the password information in the third index table, and obtain the second index address corresponding to the password information; that is, store the password information in the space of the second index address in the third index table, and each second index address Only one set of password information is stored in the space.

[0114] S303: In the first index table, set the flag bit stored in the first index address that matches the value of the u...

Embodiment 3

[0145] This embodiment is a computer-readable storage medium corresponding to the above-mentioned embodiments, on which a computer program is stored, and when the program is executed by a processor, the following steps are implemented:

[0146] Obtain the authentication Hash value and authentication response value of the PPTP VPN password;

[0147] According to the value of the lower 8 bytes of the authentication Hash value and the value of the upper 8 bytes of the authentication response value, through brute force traversal, obtain the upper 2 bytes of the NTHash value corresponding to the authentication Hash value and the authentication response value value;

[0148] According to the value of the upper 2 bytes of the NTHash value and its corresponding password information, an index table is generated, and the password information includes an authentication Hash value and an authentication response value;

[0149] Generate a password through the preset password traversal met...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a PPTP (Point to Point Tunneling Protocol) VPN (Virtual Private Network) password verification method and a computer readable storage medium. The method comprises: acquiring anauthentication Hash value and an authentication response value of a PPTP VPN password; obtaining a high-order 2-byte value of an NTHash value corresponding to the authentication Hash value and the authentication response value; according to the high-order 2-byte value of the NTHash value and the correspondingauthentication Hash value and authentication response value, generating an index table; generating a password and calculating a suspected NTHash value corresponding to the password; according to the high-order 2-byte value of the suspected NTHash value, acquiring the correspondingauthentication Hash value and authentication response value; and according to the correspondingauthentication Hash value and authentication response value, verifying the suspected NTHash value. The method canreduce the traversal time and improve the verification efficiency.

Description

technical field [0001] The invention relates to the technical field of encryption, in particular to a PPTP VPN password verification method and a computer-readable storage medium. Background technique [0002] The Virtual Private Network (VPN) based on the Point-to-Point Tunneling Protocol (PPTP) is currently a common tunneling protocol for establishing a private network on a public network for encrypted communication. [0003] The PPTP protocol network message encryption uses the encryption and decryption key obtained after a series of algorithm operations to obtain the 16-byte NTHash value of the user password through the MD4 encryption algorithm. Therefore, as long as the NTHash value can be obtained, the user's message can be completely restored. The 24-byte authentication response value (ChallengeResponse) and the 20-byte authentication Hash value (ChallengeHash) can be directly obtained from the plaintext information of the PPTP VPN password communication message. Cha...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/32H04L9/06H04L12/46
Inventor 梁瑞彬林俊阳陈秀容汤伟宾
Owner XIAMEN MEIYA PICO INFORMATION
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products