Rapid password cracking method and system, computer program and storage medium
A cryptographic and fast technology, applied in the field of cryptography, can solve the problems of computing power, time, energy waste, etc., and achieve the effect of reducing computing power, improving success rate and efficiency, and quickly cracking
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Example Embodiment
[0040] Example 1
[0041] Append figure 1 It is shown in this preferred embodiment to quickly crack the method of fast cracking method, which the specific process of the fast cracking method can be as follows:
[0042] Step 1, preprocessing the target file.
[0043] Specifically, first determined whether the decryption target is an encrypted feature value or a file. If the decryption target is an encryption feature value, the process proceeds to step 2.
[0044] If the decryption target is a file, you need to judge the file type. Specifically, the general file header carries file type information, which can be parsed by parsing the file type. It can also be judged with the file after the complex name, such as * .doc is the 2003 version of MS Word, *. Xlsx is MS Excel, 2007 or higher. If these two methods have conflicts, the type of document known to parsing the file header is accurate. In general, the encryption feature value file is a .txt text file, in addition, the encryption f...
Example Embodiment
[0066] Example 2
[0067] Append figure 2 As shown, it is a working principle diagram of a password rapid crack system provided by this preferred embodiment. The password rapid crack system, including file type determination module, encryption feature value extraction module, encryption feature value read module, encryption feature value Crack results correspondence table, password crack module, password crack the library module and the result query module.
[0068] Among them, the file type determination module is used to determine the type of decryption target file; the encryption feature value extraction module is used to extract the encryption feature value of the file; the encryption feature value read module is used to read the encryption feature value of the file; encryption feature The value is used to store the password corresponding to the encryption character value; the password is used to write the password module to the encryption feature value and the crack result ta...
Example Embodiment
[0070] Example 3
[0071] This preferred embodiment provides a computer program that can implement the steps in either embodiment of the password provided by the following embodiment of the present application, and therefore, any password provided in the present application embodiment can be implemented. The beneficial effects of cracking methods are detailed in the first embodiment, and details are not described herein.
PUM
Abstract
Description
Claims
Application Information
- R&D Engineer
- R&D Manager
- IP Professional
- Industry Leading Data Capabilities
- Powerful AI technology
- Patent DNA Extraction
Browse by: Latest US Patents, China's latest patents, Technical Efficacy Thesaurus, Application Domain, Technology Topic.
© 2024 PatSnap. All rights reserved.Legal|Privacy policy|Modern Slavery Act Transparency Statement|Sitemap