Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

A password attack evaluation method based on conditional variational self-coding

A conditional encoding and self-encoding technology is applied in the field of password attack assessment based on conditional variational self-encoding, which can solve the problems of attack, consume large computing resources and time cost, and is not suitable for real-time password strength assessment, so as to improve the strength and security. security, improve password strength and security

Active Publication Date: 2019-04-23
BEIJING WISEWEB TECH
View PDF3 Cites 12 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] However, user passwords are prone to some disadvantages. Multiple password database leaks indicate that users tend to choose passwords that are easy to guess, mainly composed of common strings and numbers, and many password creation rules contain a variety of personal information combinations Therefore, it is easy to be attacked by password deciphering algorithms. It is a very important security issue to confirm whether the user's password setting is safe; some existing traditional statistical methods cannot accurately learn the user's password setting habits, and at the same time need to consume a lot of calculations Resource and time costs are not suitable for real-time password strength assessment, and most of the existing password security detection algorithms only consider the probability distribution of characters in the password data set, and do not include user personal information (such as email address, user name, etc.) ) into feature conditions, and these personal information often have a strong correlation with passwords

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A password attack evaluation method based on conditional variational self-coding
  • A password attack evaluation method based on conditional variational self-coding
  • A password attack evaluation method based on conditional variational self-coding

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0036] In order to deepen the understanding of the present invention, the present invention will be further described below in conjunction with the examples, which are only used to explain the present invention, and do not constitute a limitation to the protection scope of the present invention.

[0037] according to figure 1 As shown, this embodiment proposes a cryptographic attack evaluation method based on conditional variational self-encoding, including the following steps:

[0038] Step 1: Build a Variational Autoencoder Model

[0039] Firstly, a variational autoencoder model is generated after regularization based on the standard autoencoder model, and a prior distribution is imposed on the hidden variable by using the variational autoencoder model On the above, the encoder in the standard autoencoder is replaced by the learned posterior recognition model through the variational autoencoder model, and the neural network is used as the encoder function to parameterize t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention provides a password attack evaluation method based on conditional variational self-coding. The method comprises the following steps of constructing a variational self-coding model, constructing a conditional variational self-coding model, constructing a password attack model, and comprehensively utilizing the conditional variational self-coding model and the password attack model. According to the invention, a conditional variational self-coding model, and the condition characteristics in the personal information of the user, such as the user name, the mailbox address, the telephone number, etc. are used to train the cryptographic attack model, a bidirectional GRU recurrent neural network and a CNN text convolutional neural network are respectively used at the encoder end, sothat the code of a password sequence and personal information of a user and abstract extraction of characteristics can be achieved, the distribution of password data and a character combination rulecan be effectively fitted, the high-quality guessing password data can be generated, and the method has a remarkable effect on improving the password strength and safety of the user.

Description

technical field [0001] The invention relates to the field of Internet data encryption, in particular to a cryptographic attack evaluation method based on conditional variational self-encoding. Background technique [0002] Variational Autoencoder (VAE) is a generative model based on a regularized version of the standard autoencoder model. [0003] Passwords are a common way of data encryption and user authentication. The passwords set by users are not completely random, so they are vulnerable to password cracking tools. Using a password guessing algorithm is an effective way to assess the strength and security of a user's password. [0004] However, user passwords are prone to some disadvantages. Multiple password database leaks indicate that users tend to choose passwords that are easy to guess, mainly composed of common strings and numbers, and many password creation rules contain a variety of personal information combinations Therefore, it is easy to be attacked by pass...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): G06F21/55G06F21/60G06N3/04G06N3/08
CPCG06F21/55G06F21/602G06N3/084G06N3/045
Inventor 段大高莫倩
Owner BEIJING WISEWEB TECH
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products