Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

Password strength evaluation method based on weak password deduction

A weak password and password technology, applied in the field of information security, can solve problems such as inability to judge, and achieve the effect of improving accuracy and enhancing capabilities

Active Publication Date: 2018-10-12
EAST CHINA NORMAL UNIV
View PDF2 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the leading academic password strength assessment method based on the PCFG algorithm cannot judge this

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Password strength evaluation method based on weak password deduction
  • Password strength evaluation method based on weak password deduction

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0047] The meanings of relevant technical terms in this embodiment are as follows:

[0048] PCFG: Probabilistic Context Free Grammar

[0049] W: weak password set

[0050] w: element in W

[0051] Wn: passwords of length n in the weak password set (Lmin≤n≤Lmax)

[0052] Lmax: The maximum length of the password string that the target system allows to receive

[0053] Lmin: The minimum length of the password string that the target system allows to receive

[0054] T: training set

[0055] OLCS (Optimal Longest Common Subsequence): Optimal Longest Common Subsequence Algorithm

[0056] pw: the password to be parsed

[0057] SUB: the set of all substrings of pw

[0058] SUB×W: Cartesian product of SUB and W

[0059] sub: element in SUB

[0060] DT: edit distance threshold

[0061] ST: similarity threshold

[0062] V={Start,A,L,U,D,S,K,insert,delete,replace,no,W1,W2,...Wn}, is a set of non-terminal symbols, and its elements are called non-terminal symbols

[0063] ∑={95 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a password strength evaluation method based on weak password deduction, and the method comprises the following steps: 1) generation of a weak password set: selecting highly ranked passwords as the weak password set from a password sample according to a mode of a descending order of frequency of occurrence; 2) grammar training: parsing passwords in a training set based on the weak password set, and generating a probability context-free grammar table with a weak password tag; 3) password strength evaluation: inputting the password, calculating probability of the passwordaccording to the grammar table generated through the grammar training, wherein the higher a probability value is, the lower the password strength is; 4) updating of the grammar table: according to theinput password, dynamically adjusting distribution probability of the probability context-free grammar with the weak password tag. In the method provided by the invention, the password similar as thepassword in the weak password set is deduced through the existing probability context-free grammar, the method inherits efficiency and robustness of the conventional password strength evaluation method and simultaneously can eliminate potential weak passwords, enhance password-guessing attack resistance ability of the passwords and improve security of users.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a password strength evaluation method based on weak password derivation. Background technique [0002] The rapid development of Internet technology has profoundly changed people's study, work and lifestyle. In recent years, information technology represented by mobile Internet and e-commerce has greatly facilitated people's lives. And the information security problem which is closely related to the Internet has been paid more and more attention by people. As an important way to protect user information security, identity authentication is widely used in various service sites on the Internet. [0003] Identity authentication is the main means to protect user information security. Password authentication has become the most widely used identity authentication method on the Internet because of its convenient deployment and flexible use. However, password-based authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 何道敬周贝贝吴宇
Owner EAST CHINA NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products