Password cracking method and system of generative adversarial network based on strategy gradient
A generative and password technology, applied in the field of password cracking of generative adversarial networks, can solve the problems of high hit rate, inability to realize the whole process of password guidance, not really learning the user's set password, etc., and achieve the effect of sharp discrimination ability.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment 1
[0044] Such as figure 1 As shown, the present embodiment provides a password cracking method based on a policy gradient-based generative confrontation network, comprising the following steps:
[0045] S1: Perform data preprocessing, the specific steps include:
[0046] S11: Determine the length of the longest password and the maximum number of character types allowed in the password;
[0047] As for the type of characters, this embodiment is set to 2048, which can contain almost all characters that can appear in the password. In terms of length, passwords with a length of 10 or less are selected as experimental data, and passwords with a length of less than 10 will use the character "`" Make up;
[0048] S12: Transform raw data training data: filter the collected leaked password set and convert it into a character array composed of characters contained in a password, if the characters in a password in the collected leaked password set are not included in the limited characte...
Embodiment 2
[0105] The present embodiment provides a password cracking system based on a policy gradient-based generative confrontation network, including: a data preprocessing module, a neural network construction module, a network pre-training module, a network confrontation training module and a blasting password set generation module;
[0106] In this embodiment, the data preprocessing module is used for data set preprocessing, determines the length of the longest password and the maximum number of character types allowed in the password, and clears the passwords whose length exceeds the preset value and the occurrence of non-permitted characters, and obtains training Password set, convert the training password set into a character array composed of characters, perform character frequency statistics on the character array and sort to obtain a character dictionary, convert the character array into a digital password array according to the dictionary, and obtain the training data set ; ...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


