Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A password strength assessment method based on weak password derivation

A weak password and password technology, applied in the field of information security, can solve problems such as inability to judge, and achieve the effect of improving accuracy and enhancing capabilities

Active Publication Date: 2022-04-05
EAST CHINA NORMAL UNIV
View PDF2 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] However, the leading academic password strength assessment method based on the PCFG algorithm cannot judge this

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A password strength assessment method based on weak password derivation
  • A password strength assessment method based on weak password derivation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment

[0047] The meanings of relevant technical terms in this embodiment are as follows:

[0048] PCFG: Probabilistic Context Free Grammar

[0049] W: weak password set

[0050] w: element in W

[0051] Wn: passwords of length n in the weak password set (Lmin≤n≤Lmax)

[0052] Lmax: The maximum length of the password string that the target system allows to receive

[0053] Lmin: The minimum length of the password string that the target system allows to receive

[0054] T: training set

[0055] OLCS (Optimal Longest Common Subsequence): Optimal Longest Common Subsequence Algorithm

[0056] pw: the password to be parsed

[0057] SUB: the set of all substrings of pw

[0058] SUB×W: Cartesian product of SUB and W

[0059] sub: element in SUB

[0060] DT: edit distance threshold

[0061] ST: similarity threshold

[0062] V={Start,A,L,U,D,S,K,insert,delete,replace,no,W1,W2,...Wn}, is a set of non-terminal symbols, and its elements are called non-terminal symbols

[0063] ∑={95 ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a password strength evaluation method based on weak password derivation, which includes the following steps: 1) generating a weak password set: selecting top-ranked passwords from password samples in descending order of appearance frequency as the weak password set; 2) Grammar training: parse the passwords in the training set based on the weak password set, and generate a probabilistic context-free grammar table with weak password labels; 3) Password strength evaluation: input the password, and calculate the probability of the password according to the grammar table generated by the grammar training, the higher the probability value Indicates that the password strength is lower; 4) Grammar table update: according to the input password, dynamically adjust the probability distribution of the probabilistic context-free grammar with weak password labels. The present invention utilizes the existing probabilistic context-free grammar to derive passwords similar to weak password centralized passwords, while inheriting the efficiency and robustness of traditional password strength evaluation methods, it can eliminate potential weak passwords and enhance password resistance to password guessing attacks ability to improve user security.

Description

technical field [0001] The invention belongs to the technical field of information security, in particular to a password strength evaluation method based on weak password derivation. Background technique [0002] The rapid development of Internet technology has profoundly changed people's study, work and lifestyle. In recent years, information technology represented by mobile Internet and e-commerce has greatly facilitated people's lives. And the information security problem which is closely related to the Internet has been paid more and more attention by people. As an important way to protect user information security, identity authentication is widely used in various service sites on the Internet. [0003] Identity authentication is the main means to protect user information security. Password authentication has become the most widely used identity authentication method on the Internet because of its convenient deployment and flexible use. However, password-based authen...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): G06F21/46
CPCG06F21/46
Inventor 何道敬周贝贝吴宇
Owner EAST CHINA NORMAL UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products