A method and device for quickly deciphering PGP encrypted mail
A symmetric encryption algorithm and fast technology, applied in the field of information security, can solve the problems of low cracking efficiency and insufficient use of known information, so as to reduce the amount of decryption calculation, reduce the number of hash calculations, and speed up the cracking speed. Effect
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0036] as attached figure 1 As shown, the present embodiment discloses a flow process of a method for quickly deciphering PGP encrypted mail, and the deciphering method includes:
[0037] S1, private key parameter analysis step, from the private key ring file to be cracked, extract the parameters and ciphertext needed for cracking, wherein the parameters needed for cracking include the length skrLen and salt value corresponding to the private key, and the encrypted private key parameters ;
[0038] S2, the symmetric encryption algorithm key calculation step, according to the input password password and the extracted salt value, and then use the hash algorithm to generate the symmetric encryption algorithm key key required for decryption;
[0039] S3, the decryption step, using the key key and the decryption algorithm to decrypt the first N bytes of the encrypted private key parameter, where N is an integer multiple of 4, to obtain the decrypted data skrData, according to the ...
Embodiment 2
[0044] This embodiment considers that the PGP encrypted mail uses the AES256 algorithm to protect the private key parameters, and the specific PGP encrypted mail fast deciphering method is as follows:
[0045] R1. Obtain the private key ring of the recipient, and extract the parameters required for cracking from the private key ring, mainly including the length skrLen and salt value corresponding to the private key, and the encrypted private key parameters.
[0046] R2, according to the input password password and the extracted salt value, and then use the hash algorithm to generate the key key required for decryption.
[0047] R3. Use the key key and the AES256 algorithm to decrypt the first N bytes of the encrypted private key parameter. N is a multiple of 4. In this embodiment, N=4 is used to obtain the decrypted data skrData, which occupies 4 bytes. byte.
[0048] R4. According to the data structure of the private key parameter, take out the decrypted private key paramete...
Embodiment 3
[0054] as attached figure 2 As shown, the present embodiment discloses a device for quickly deciphering PGP encrypted emails, and the device for deciphering quickly includes a private key parameter analysis unit, a symmetric encryption algorithm key calculation unit, a decryption unit, and a password verification unit connected in sequence and the second password verification unit, wherein,
[0055] The private key parameter parsing unit is used to extract the parameters and ciphertext needed for cracking from the private key ring file to be cracked, wherein the parameters needed for cracking include the length skrLen and salt value corresponding to the private key, encrypted private key parameters;
[0056] The symmetric encryption algorithm key calculation unit is used to generate the symmetric encryption algorithm key key required for decryption by using the hash algorithm according to the input password password and the extracted salt value;
[0057] The decryption unit...
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com