Unlock instant, AI-driven research and patent intelligence for your innovation.

Lightweight password encryption method and system

An encryption method and encryption system technology, applied in the field of lightweight password encryption methods and systems, can solve problems such as unfavorable transplantation expansion, reduced security, low security, etc. Effect

Inactive Publication Date: 2018-08-28
GUANGDONG EFLYCLOUD COMPUTING CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] A secure hash function should at least meet the following conditions: ①The input length is arbitrary; ②The output length is fixed, and should be at least 128 bits according to the current existing computing technology; ③For each given input, calculate Its hash value is very easy; ④ It is computationally infeasible to construct two independent inputs with the same hash value
[0007] Although the one-way encryption of HASH is very concise, it is easy to be cracked by brute force, because the length of the summary generated by the algorithm is 128bit (16byte), and its security is low. Under the current computing power, it is easy to be cracked by exhaustive attacks. Security is gradually reduced with the increasing computing power of today's computers
Symmetric encryption of the plaintext key, this encryption method is relatively private, but it still cannot withstand the use of rainbow tables (pre-calculated tables used for inverse operations of encrypted hash functions, whose content is the hash value of cracked passwords) attack, and this encryption method is relatively cumbersome and heavy, which is not conducive to transplantation and expansion
And sometimes some relatively small websites have very little chance of being attacked, so more complex encryption methods are not suitable for use
[0008] All in all, in the existing technology, there is no technical solution that is conducive to transplantation and expansion and is not easy to be cracked by brute force attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight password encryption method and system
  • Lightweight password encryption method and system
  • Lightweight password encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0029] The concept, specific structure and technical effects of the present disclosure will be clearly and completely described below in conjunction with the embodiments and drawings, so as to fully understand the purpose, scheme and effect of the present disclosure. It should be noted that, in the case of no conflict, the embodiments in the present application and the features in the embodiments can be combined with each other. The same reference numbers are used throughout the drawings to indicate the same or similar parts.

[0030] figure 1 Shown is a flowchart of a password encryption method according to an embodiment of the present disclosure, combined below figure 1 A password encryption method according to an embodiment of the present disclosure will be described.

[0031] In this embodiment, a lightweight password encryption method is provided. According to an aspect of the present disclosure, a lightweight password encryption method is provided, including steps:

...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a lightweight password encryption method. The method comprises the following steps: step one, acquiring a user name and plaintext password input by a user; step two, generatinga salt random number A1 through the user name; step three, performing the first layer of encryption on the plaintext password of the user to generate an encrypted character string A2; step four, performing character string connection on the A1 and A2 to obtain an encrypted character string A3; and five, performing the second layer of encryption on the encrypted combined character string A3 to obtain the final encrypted password A4 after accomplishing the encryption step. Furthermore, the invention further provides a lightweight password encryption system. Through the method and system provided by the invention, a reliable encrypted password can be quickly obtained, thereby preventing the password from being easily stolen and the security of the project from being damaged; the method is infavor of transplanting and extending, and the encryption complexity is greatly reduced.

Description

technical field [0001] The present disclosure relates to the technical field of data communication security, and more particularly, to a lightweight password encryption method and system. Background technique [0002] Password security questions are one of the most important parts of a website. But in fact, there are still many websites that do not have this security awareness, and they still store passwords in clear text, which is very dangerous. [0003] At the end of 2011 and the beginning of 2012, the user passwords of many websites were leaked. The root cause was that the plain text storage of user passwords and the access control measures of password files were not strict enough. Once the database was leaked, hackers could directly grasp all the passwords. Preventing password files from being deciphered involves many aspects of information security, and it is difficult to completely prevent them. [0004] Now there are many ways to enhance password security, for exam...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/08H04L9/06H04L9/14
CPCH04L9/0643H04L9/0861H04L9/0863H04L9/0869H04L9/14
Inventor 林家伟周保群黄燕飞陈美任
Owner GUANGDONG EFLYCLOUD COMPUTING CO LTD
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More