Unlock instant, AI-driven research and patent intelligence for your innovation.

Password dictionary generation method and computer-readable storage medium

A password and dictionary technology, applied in the field of passwords, can solve the problems of not analyzing password setting rules, unable to expand password dictionary, etc., to achieve great application value and improve the effect of success rate

Active Publication Date: 2020-04-28
XIAMEN MEIYA PICO INFORMATION
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

In the above scheme, the password traversal algorithm designed according to the distribution law of password characters and the correlation probability can reduce the traversal time and give priority to constructing passwords with high probability to improve the success rate, but the algorithm does not analyze the password setting rules and cannot be based on the password rules. To expand the password dictionary, has certain limitations

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password dictionary generation method and computer-readable storage medium
  • Password dictionary generation method and computer-readable storage medium
  • Password dictionary generation method and computer-readable storage medium

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0137] Please refer to figure 1 , Embodiment 1 of the present invention is: a kind of password dictionary generation method, described method is based on recursive neural network, the password dictionary obtained can be used for password recovery; Described method comprises the following steps:

[0138] S1: Collect a password set, which includes real passwords and virtual passwords; in order to prevent overfitting, the password set consists of two parts, the first part comes from real passwords in real websites or information management system databases, and the second part It is a virtual password composed of commonly used password keywords (such as admin, etc.) plus a randomly generated suffix; further, the first part accounts for 70% of the total capacity of the password set, and the second part accounts for 30%, and the total capacity is not less than 10 million .

[0139] S2: Generate a test set, the test set includes plaintext passwords; the total capacity of the test s...

Embodiment 2

[0156] Please refer to figure 2 , this embodiment is a further expansion of steps S3 and S7 in Embodiment 1, taking step S3 as an example, step S3 includes the following steps:

[0157] S301: Construct a recurrent neural network model, where the recurrent neural network model includes an input layer, a hidden layer, and an output layer, where the hidden layer includes three GRU layers.

[0158] Specifically, the recurrent neural network is used as the benchmark structure of the model, in which, in order to have the ability to remember the context of the long-term information sequence, the long-short-term memory network layer (LSTM) is used as the basic unit of the model, in order to improve efficiency and reduce the amount of calculation , and further adopts the variant model of the network - Gated Recurrent Unit (GRU), the original LSTM model forgets the gate and the input gate to synthesize the update gate, and improves the dictionary generation speed while maintaining the ...

Embodiment 3

[0175] Please refer to image 3, this embodiment is a further expansion of steps S4 and S8 in the above embodiment, taking step S4 as an example, step S4 includes the following steps:

[0176] S401: Obtain a character set, where the character set includes a-z, 0-9 and special characters.

[0177] S402: Randomly select a character from the character set as the first character of a password;

[0178] S403: Using the character as the current character, and according to the current character and the dictionary model, calculate the occurrence probability of each character through a cost function, that is, the probability that each character appears after the current character.

[0179] S404: Obtain the character of the preset second number with the highest probability, and randomly select a character from the characters of the second number as the next character of the password; in this embodiment, the second The number is 5, that is, a character is selected at any time from the ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a password dictionary generation method and a computer readable storage medium. The method comprises the steps of collecting a password set; generating a test set; training thecurrent password set via a recurrent neural network model to acquire a dictionary model; generating a dictionary according to the dictionary model; acquiring a hit rate of the current password set according to the test set; randomly modifying the current password set to acquire the new password set; training the new password set via the recurrent neural network model to acquire the new dictionarymodel; generating the new dictionary according to the new dictionary model; acquiring the hit rate of the new password set according to the test set; if the hit rate of the new password set is more than that of the current password set, adding 1 to the number of update times, and using the new password set as the current password set; and when the number of update times reaches a preset first number of times, generating a password dictionary according to the dictionary model corresponding to the current password set. The password dictionary finally generated by the method provided by the invention can improve a success rate of password recovery.

Description

technical field [0001] The present invention relates to the technical field of encryption, in particular to a method for generating a password dictionary and a computer-readable storage medium. Background technique [0002] Brute force traversal and dictionary traversal are the two most commonly used traversal methods in password recovery. Brute force traversal is to traverse all the passwords in the rules specified by the user, and dictionary traversal is to traverse the passwords in the dictionary file. The brute force method often requires more rules to cover as large a password space as possible to improve the success rate of password recovery, but too large a password space will double the traversal time, or even take hundreds of thousands of years, making password recovery meaningless. The success rate of the dictionary traversal method is often limited by the number of passwords in the dictionary. Since the number of passwords in the dictionary is generally not too m...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L9/08G06N3/04G06N3/08
Inventor 张光斌高志鹏黄仁裕姚灿荣尤俊生庄进发
Owner XIAMEN MEIYA PICO INFORMATION