Unlock instant, AI-driven research and patent intelligence for your innovation.

Multifunctional integrated high-speed HMAC-SHA1 password recovery method based on mimicry calculation

A recovery method and multi-functional technology, applied in the field of cryptography, can solve problems such as low clock frequency, reduced SHA1 calculation speed, recovery speed bottleneck, etc.

Active Publication Date: 2021-03-26
创元网络技术股份有限公司
View PDF4 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] However, in the actual processing process, there are the following problems: On the one hand, the Hash algorithm is unidirectional, so HMAC uses this feature of the Hash algorithm to authenticate the password, and the corresponding password can be obtained after HMAC processing. It is impossible to reversely calculate the export password value through this Hash password authentication code; on the other hand, the core computation of HMAC-SHA1 password recovery lies in the SHA1 operation it depends on, so The speed of SHA1 operation will be the bottleneck of the entire HMAC-SHA1 password recovery speed
For example, the serial implementation design of SHA1 is less difficult, but the final working clock frequency is very low, which will greatly reduce the calculation speed of SHA1

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Multifunctional integrated high-speed HMAC-SHA1 password recovery method based on mimicry calculation
  • Multifunctional integrated high-speed HMAC-SHA1 password recovery method based on mimicry calculation
  • Multifunctional integrated high-speed HMAC-SHA1 password recovery method based on mimicry calculation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment 1

[0066] The Hash algorithm is unidirectional, so HMAC uses this feature of the Hash algorithm to authenticate the password. After the password is processed by HMAC, the corresponding unique Hash password authentication code can be obtained. Through this Hash password authentication code It is impossible to reversely calculate the password value. The only way is to continuously try the forward calculation process of HMAC password authentication until the correct password represented by the target Hash password authentication code is collided. The present invention refers to the target password authentication code as HashValue, the combination of HashValue and salt value salt called the feature string.

[0067] combine figure 2 , a multifunctional integrated high-speed HMAC-SHA1 password recovery method based on mimic computing, comprising the following steps:

[0068] S1. Parse the HashValue and salt according to the given characteristic string;

[0069] S2. Generate a trial p...

Embodiment 2

[0076] combine image 3 , the core computation of HMAC-SHA1 password recovery lies in the SHA1 operation it depends on, so the speed of SHA1 operation will be the bottleneck of the speed of the entire HMAC-SHA1 password recovery. A single message group needs to go through 80 steps to perform SHA1 operation. Contains sub-operations such as AND, OR, XOR, and shift. From the perspective of FPGA hardware design, many design ideas can be generated for these steps and sub-operations combined with clock cycle factors, but different ideas will ultimately determine different SHA1 calculations. speed. For example, the serial implementation design of SHA1 is less difficult, but the final working clock frequency is very low, which will greatly reduce the calculation speed of SHA1. The present invention adopts three methods to optimize and realize the SHA1 calculation module.

[0077] 1. Pipeline type: Pipeline technology is to decompose a calculation process into several sub-processes, a...

Embodiment 3

[0085] For two basic HMAC-SHA1 password processing and PBKDF2-HMAC-SHA1 password processing, the present invention sets them into three modes, which are named password_mode, salt_mode and round_mode respectively.

[0086] combine Figure 4 , the workflow of password_mode mode includes: b1, use password to fill 0 to 512 bits and a 512-bit value that repeats every 8 bits of hexadecimal 36 to XOR to get a Message, and this Message and the initial H of SHA1 are input into SHA1 for operation , the result H is recorded as IPAD;

[0087] b2. Use password to complement 0 to 512 digits and a value of 512 digits that repeats 5c in hexadecimal every 8 digits to perform XOR to obtain a Message. The initial H of this Message and SHA1 is input into SHA1 for operation, and the result H is recorded as OPAD;

[0088] b3. Carry out SHA1 rule message padding on the salt, in which the length part should count the 64 bytes occupied by the Message when the IPAD is generated, that is, 512 bits, and...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention relates to a multifunctional integrated high-speed HMAC-SHA1 password recovery method based on mimicry calculation. The multifunctional integrated high-speed HMACSHA1 password recovery method based on mimicry calculation comprises the following steps of S1, analyzing HashValue and salt according to a given feature string; S2, generating a tentative password in a certain mode; S3, ifthe tentative password is completely enumerated, ending the password recovery, and if the password recovery fails, continuing the password recovery; S4, sending the tentative password and the salt into an HMAC-SHA1 password processing process, and recording a processing result as digest; and S5, if the digest is consistent with the HashValue, determining that the tentative password corresponding to the digest is a correct password and the password is successfully recovered, and otherwise, starting the process again from the step S2. According to the multifunctional integrated high-speed HMAC-SHA1 password recovery method provided by the invention, a mimicry calculation idea is utilized to construct a multifunctional integrated high-speed HMAC-SHA1 password recovery kernel conforming to a mimicry calculation theory, and the reconfigurable and adaptive characteristics of the kernel are optimization and improvement of an HMAC-SHA1 password recovery problem on a calculation mode.

Description

technical field [0001] The invention belongs to the technical field of encryption, and in particular relates to a multifunctional integrated high-speed HMAC-SHA1 password recovery method based on mimetic computing. Background technique [0002] The comprehensive popularization of network information technology is an inevitable trend of today and the future, and the network information space has become the fifth dimensional space after sea, land, air and sky. Passwords play an indispensable role in network information technology, and its role and influence range from the level of the general public to the level of the nation. This is because, in the field of information security, for scenarios such as data protection and identity authentication, passwords are the most traditional and most important means of information security protection. The most important means of information security protection. Although passwords have positive significance in legal information security...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/32H04L9/08
CPCH04L9/3226H04L9/3236H04L9/0894
Inventor 申智灵周清雷邓淼磊张少华刘晶波陈慕王凡冯峰李斌董召薛正元
Owner 创元网络技术股份有限公司
Features
  • R&D
  • Intellectual Property
  • Life Sciences
  • Materials
  • Tech Scout
Why Patsnap Eureka
  • Unparalleled Data Quality
  • Higher Quality Content
  • 60% Fewer Hallucinations
Social media
Patsnap Eureka Blog
Learn More