Multifunctional integrated high-speed HMAC-SHA1 password recovery method based on mimicry calculation
A recovery method and multi-functional technology, applied in the field of cryptography, can solve problems such as low clock frequency, reduced SHA1 calculation speed, recovery speed bottleneck, etc.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0066] The Hash algorithm is unidirectional, so HMAC uses this feature of the Hash algorithm to authenticate the password. After the password is processed by HMAC, the corresponding unique Hash password authentication code can be obtained. Through this Hash password authentication code It is impossible to reversely calculate the password value. The only way is to continuously try the forward calculation process of HMAC password authentication until the correct password represented by the target Hash password authentication code is collided. The present invention refers to the target password authentication code as HashValue, the combination of HashValue and salt value salt called the feature string.
[0067] combine figure 2 , a multifunctional integrated high-speed HMAC-SHA1 password recovery method based on mimic computing, comprising the following steps:
[0068] S1. Parse the HashValue and salt according to the given characteristic string;
[0069] S2. Generate a trial p...
Embodiment 2
[0076] combine image 3 , the core computation of HMAC-SHA1 password recovery lies in the SHA1 operation it depends on, so the speed of SHA1 operation will be the bottleneck of the speed of the entire HMAC-SHA1 password recovery. A single message group needs to go through 80 steps to perform SHA1 operation. Contains sub-operations such as AND, OR, XOR, and shift. From the perspective of FPGA hardware design, many design ideas can be generated for these steps and sub-operations combined with clock cycle factors, but different ideas will ultimately determine different SHA1 calculations. speed. For example, the serial implementation design of SHA1 is less difficult, but the final working clock frequency is very low, which will greatly reduce the calculation speed of SHA1. The present invention adopts three methods to optimize and realize the SHA1 calculation module.
[0077] 1. Pipeline type: Pipeline technology is to decompose a calculation process into several sub-processes, a...
Embodiment 3
[0085] For two basic HMAC-SHA1 password processing and PBKDF2-HMAC-SHA1 password processing, the present invention sets them into three modes, which are named password_mode, salt_mode and round_mode respectively.
[0086] combine Figure 4 , the workflow of password_mode mode includes: b1, use password to fill 0 to 512 bits and a 512-bit value that repeats every 8 bits of hexadecimal 36 to XOR to get a Message, and this Message and the initial H of SHA1 are input into SHA1 for operation , the result H is recorded as IPAD;
[0087] b2. Use password to complement 0 to 512 digits and a value of 512 digits that repeats 5c in hexadecimal every 8 digits to perform XOR to obtain a Message. The initial H of this Message and SHA1 is input into SHA1 for operation, and the result H is recorded as OPAD;
[0088] b3. Carry out SHA1 rule message padding on the salt, in which the length part should count the 64 bytes occupied by the Message when the IPAD is generated, that is, 512 bits, and...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More - R&D
- Intellectual Property
- Life Sciences
- Materials
- Tech Scout
- Unparalleled Data Quality
- Higher Quality Content
- 60% Fewer Hallucinations
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic, Popular Technical Reports.
© 2025 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap|About US| Contact US: help@patsnap.com



