Rapid password cracking method and system, computer program and storage medium

A cryptographic and fast technology, applied in the field of cryptography, can solve the problems of computing power, time, energy waste, etc., and achieve the effect of reducing computing power, improving success rate and efficiency, and quickly cracking

Active Publication Date: 2021-07-20
NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
View PDF21 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

Regardless of the type of repetitive tasks, multiple calculations for repeated

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Rapid password cracking method and system, computer program and storage medium
  • Rapid password cracking method and system, computer program and storage medium
  • Rapid password cracking method and system, computer program and storage medium

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0040] Example 1

[0041] Append figure 1 It is shown in this preferred embodiment to quickly crack the method of fast cracking method, which the specific process of the fast cracking method can be as follows:

[0042] Step 1, preprocessing the target file.

[0043] Specifically, first determined whether the decryption target is an encrypted feature value or a file. If the decryption target is an encryption feature value, the process proceeds to step 2.

[0044] If the decryption target is a file, you need to judge the file type. Specifically, the general file header carries file type information, which can be parsed by parsing the file type. It can also be judged with the file after the complex name, such as * .doc is the 2003 version of MS Word, *. Xlsx is MS Excel, 2007 or higher. If these two methods have conflicts, the type of document known to parsing the file header is accurate. In general, the encryption feature value file is a .txt text file, in addition, the encryption f...

Example Embodiment

[0066] Example 2

[0067] Append figure 2 As shown, it is a working principle diagram of a password rapid crack system provided by this preferred embodiment. The password rapid crack system, including file type determination module, encryption feature value extraction module, encryption feature value read module, encryption feature value Crack results correspondence table, password crack module, password crack the library module and the result query module.

[0068] Among them, the file type determination module is used to determine the type of decryption target file; the encryption feature value extraction module is used to extract the encryption feature value of the file; the encryption feature value read module is used to read the encryption feature value of the file; encryption feature The value is used to store the password corresponding to the encryption character value; the password is used to write the password module to the encryption feature value and the crack result ta...

Example Embodiment

[0070] Example 3

[0071] This preferred embodiment provides a computer program that can implement the steps in either embodiment of the password provided by the following embodiment of the present application, and therefore, any password provided in the present application embodiment can be implemented. The beneficial effects of cracking methods are detailed in the first embodiment, and details are not described herein.

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention discloses a rapid password cracking method and system, a computer program and a storage medium. The method comprises the steps of S1 carrying out the preprocessing of a decryption target, and obtaining an encryption feature value; S2 querying an encryption characteristic value and cracking result corresponding table, judging whether the obtained encryption characteristic value has a corresponding cracking result in the encryption characteristic value and cracking result corresponding table, and if the corresponding cracking result exists, entering a step S5; and if the corresponding cracking result does not exist, entering the step S3; S3 adopting a conventional password cracking method for cracking, and if password cracking succeeds, entering the step S4; and if password cracking fails, ending the whole working process. S4 writing the password obtained by successful cracking into the encryption characteristic value and cracking result corresponding table; and S5 returning the password obtained by successful cracking to the user. According to the method, the situation that repeated tasks consume a large amount of computing power is avoided, so that the waste of computing power, time and energy is reduced on the whole, and the password cracking success rate and efficiency are improved.

Description

technical field [0001] The invention belongs to the field of cryptography, and in particular relates to a method, a system, a computer program and a storage medium for quickly cracking a password. Background technique [0002] Cryptography technology is closely related to our lives. For example, setting a personal computer login password can protect our computer data security; setting a website login password can protect our website data security; setting a database access password can protect database data security, etc. But when the user forgets the password he set, he needs to use password cracking software or system to restore the password, such as Hashcat, Join the Ripper, etc. [0003] Password cracking methods commonly used in password cracking systems such as brute force cracking and dictionary cracking. Among them, brute force cracking refers to the enumeration method, also known as the exhaustive method. The biggest disadvantage of using the enumeration method to ...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
IPC IPC(8): G06F21/60G06F21/62
CPCG06F21/602G06F21/6209G06F2221/2107
Inventor 刘成吉庆兵于飞尹浩
Owner NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products