Looking for breakthrough ideas for innovation challenges? Try Patsnap Eureka!

L2TP/IPSEC cracking method and system based on high-performance computing

A high-performance computing and server technology, applied in the field of information security, can solve problems such as no system and few research results

Inactive Publication Date: 2020-10-27
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF6 Cites 8 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0011] There are not many researches on L2TP / IPsec password cracking and L2TP / IPsec main mode encrypted information recovery at home and abroad. This may have a lot to do with the difficulty and sensitivity of this technology. At present, there are few public research results. Most of the known L2TP / IPsec attack-related articles are theoretical analysis and conclusions from the perspective of the protocol
Actual attack cases are mostly carried out from engineering aspects such as realizing code defects, and there are few research results on L2TP / IPsec main mode decryption from the aspects of cryptographic algorithm vulnerability analysis and password cracking, and the restoration of L2TP / IPsec main mode encrypted information The system is basically no

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • L2TP/IPSEC cracking method and system based on high-performance computing
  • L2TP/IPSEC cracking method and system based on high-performance computing
  • L2TP/IPSEC cracking method and system based on high-performance computing

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0060] In order to have a clearer understanding of the technical features, purposes and effects of the present invention, specific implementations of the present invention are now described. It should be understood that the specific embodiments described here are only used to explain the present invention, and are not intended to limit the present invention, that is, the described embodiments are only some of the embodiments of the present invention, but not all of the embodiments. Based on the embodiments of the present invention, all other embodiments obtained by those skilled in the art without making creative efforts belong to the protection scope of the present invention.

[0061] This embodiment provides a high-performance computing-based L2TP / IPSEC cracking method and system, the cracking method specifically includes the following:

[0062] 1.1 A general method to iteratively obtain the pre-shared key

[0063] L2TP / IPsec completes Diffie-Hellman key exchange based on p...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to the technical field of information security. The invention discloses an L2TP / IPSEC cracking method and system based on high-performance computing. The cracking method comprises the steps of cracking a pre-shared key, cracking a login password and realizing encryption information decryption in combination with data flow redirection. The cracking system comprises a traffic intercepting and forwarding module, a man-in-the-middle server management end and a man-in-the-middle server proxy end. According to the invention, man-in-the-middle attack is adopted firstly and thena violent cracking mode is adopted; the weakness of Diffie-Hellman is utilized to carry out man-in-the-middle attack for three times; the cracking of the pre-shared key is completed by the first man-in-the-middle attack; the second man-in-the-middle attack completes cracking of the login password, the third man-in-the-middle attack is combined with data flow redirection to achieve encryption information decryption, in the password cracking process, a user can normally access the Internet, and the method is a cracking method which is free of perception and does not have influence on the user touse the VPN.

Description

technical field [0001] The invention relates to the technical field of information security, in particular to a high-performance computing-based L2TP / IPSEC cracking method and system. Background technique [0002] At present, there are many types of VPNs on the Internet. The mixed use of L2TP and IPsec protocols forms an L2TP / IPsec VPN network with stronger performance. A widely used VPN. Log in to overseas servers through L2TP / IPsec encryption technology, bypassing the state's supervision of information networks, and bringing huge challenges to the intelligence acquisition and information forensics of national security agencies. [0003] The strongly encrypted L2TP / IPsec VPN adopts the IPsec security system based on the network layer in building an end-to-end secure link. The IPsec security system includes three basic protocols: AH protocol, ESP protocol and IKE protocol. The AH protocol provides information source verification and integrity assurance for IP packets, the ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L9/00H04L29/06
CPCH04L9/002H04L63/0485H04L63/1441H04L63/083H04L63/0281H04L63/0272
Inventor 罗杰吉庆兵张李军陈曼
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Patsnap Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Patsnap Eureka Blog
Learn More
PatSnap group products