Patents
Literature
Hiro is an intelligent assistant for R&D personnel, combined with Patent DNA, to facilitate innovative research.
Hiro

32 results about "Rainbow table" patented technology

A rainbow table is a precomputed table for reversing cryptographic hash functions, usually for cracking password hashes. Tables are usually used in recovering a password (or credit card numbers, etc.) up to a certain length consisting of a limited set of characters. It is a practical example of a space–time tradeoff, using less computer processing time and more storage than a brute-force attack which calculates a hash on every attempt, but more processing time and less storage than a simple lookup table with one entry per hash. Use of a key derivation function that employs a salt makes this attack infeasible.

Decryption hardware platform based on FPGA

The invention discloses a decryption hardware platform based on an FPGA. The decryption hardware platform is characterized in that the decryption hardware platform comprises a forwarding logic FPGA module, N mutually-independent FPGA decryption sub-modules and an ARM management sub-module which are respectively connected with the forwarding logic FPGA module, and a power supply management module supplying power to the forwarding logic FPGA module, the N mutually-independent FPGA decryption sub-modules and the ARM management sub-module, wherein the N mutually-independent FPGA decryption sub-modules are respectively connected with the ARM management sub-module, and N is no less than 2. The decryption hardware platform provided by the invention meets the decryption requirements of different files and solves the problems that an existing decryption device is single in function and poor in universality. The FPGA has the advantages that the requirements of high-speed data transmission, interfaces and high-frequency data operation are met, high-speed data transmission and high-speed data transportation are realized, and the PFGA is externally provided with a high-speed large-capacity DDR3, so that the storage of rainbow tables is realized.
Owner:GUANGZHOU HUIRUI SITONG INFORMATION SCI & TECH CO LTD

Password attacking method and apparatus, and heterogeneous acceleration platform

The invention discloses a password attacking method and apparatus, and a heterogeneous acceleration platform. The method is applied to the heterogeneous platform including a CPU terminal and an FPGA terminal. The method comprises the following steps: the FPGA terminal reads a pre-stored rainbow table and to-be-attacked ciphertext data; the FPGA terminal performs parallel processing on the to-be-attacked ciphertext data according to a preset password attacking algorithm to obtain to-be-selected password data; the FPGA terminal performs matching on the to-be-selected password data and the rainbow table according to a preset matching algorithm to find out an alternative password; and the FPGA terminal returns a completion signal to the CPU terminal. Therefore, according to the password attacking method and apparatus, and the heterogeneous acceleration platform, the FPGA is utilized to perform hardware acceleration of the password attacking algorithm, and the FPGA performs the password attacking algorithm in parallel, so the parallelism of the algorithm is improved, the throughput rate performance when the algorithm is executed is improved, and thus the performance of the password attacking algorithm based on the rainbow table is improved; and furthermore, the redundant fine graining of the FPGA terminal is parallel, so the hardware cost is relatively low.
Owner:SUZHOU LANGCHAO INTELLIGENT TECH CO LTD

Rapid restoring method for Word encrypted documents

ActiveCN106778292AFix irreversible problemsSolve the problem that cracking timeliness cannot meet actual needsDigital data protectionPasswordCiphertext
The invention discloses a rapid restoring method for Word encrypted documents. The method comprises steps as follows: step one, a secret key rainbow table of restored Word documents is established; step two, decryption secrete keys of the encrypted documents are decoded; step three, original plaintext documents are reconstructed by use of the decryption secrete keys and structure information of Word documents. The method has the positive effects as follows: the rainbow table for decrypting the secrete keys is only needed to be generated once, and the generated rainbow table is suitable for restoring all encrypted documents; restoring is not related to the complexity of encryption passwords of encrypted documents, and the defect that a long password cannot be cracked with an existing document cracking method is overcome; Word encrypted documents of version 2003 can be effectively restored, and the success rate reaches 99% or above; the encrypted documents can be rapidly restored, tests prove that the average restoring time of the encrypted documents is within 3 min under the computation ability of ordinary desktop computers (with the basic frequency being 3.0 GHz or above), and actual demands for real-time decryption can be well met.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

Data tamper-proofing method and system

InactiveCN106570423APrevent Collision AttacksStop falsified dataDigital data protectionTamper resistanceThird party
The invention discloses a data tamper-proofing method comprising the following steps of after original data information is segmented before sending, hashing the segmented information by using a pre-stored hash function to acquire an original data information verification string; synchronously sending the original data and the original data information verification string when in sending, synchronously receiving the sent data information and original data information verification string when in receiving; after the data information and the original data information verification string are received, segmenting the received data information, and then hashing the segmented information by using the pre-stored hash function to acquire a received data information verification string; and judging whether the received data information verification string is accordant with the original data information verification string by comparison, if yes, determining that the received data information is not tampered, and otherwise, determining that the received data information is tampered. The invention also provides a data tamper-proofing system. According to the method and the system provided by the invention, the difficulty of tampering the data by a third party is greatly increased, a collision attack from the third party with the aid of a rainbow table is effectively prevented, data falsification of a user is prevented, and data transmission security is ensured.
Owner:PHICOMM (SHANGHAI) CO LTD

Excel ciphertext document recovery method, computer equipment and storage medium

InactiveCN112287374AAchieve recoveryAvoid the disadvantage of being uncrackableDigital data protectionRC4Ciphertext
The invention discloses an Excel ciphertext document recovery method, computer equipment and a storage medium. The document recovery method comprises the following steps: constructing a key rainbow table of an Excel document: constructing the rainbow table according to an RC4 encryption algorithm adopted by the Excel document; decoding a decryption key of the Excel ciphertext document: decoding anintermediate key of the Excel document by utilizing a rainbow table attack, and taking the intermediate key as the decryption key; decrypting and restoring the corresponding Excel plaintext document:decrypting and restoring the plaintext document by utilizing the decrypted decryption key and the Excel document ciphertext data storage structure information. According to the method, the rainbow table for cracking the secret key only needs to be constructed once, the generated rainbow table is suitable for secret key decoding of all Excel ciphertext documents, and therefore recovery of the Excel ciphertext documents is realized. The document recovery method is irrelevant to the complexity of the document encryption password, the defect that a complex password cannot be cracked in an existing document cracking method is overcome, and the RC4 encrypted Excel document can be effectively recovered.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

An encryption method and device

The present invention provides an encryption method and apparatus. The objective of the invention is to solve the problem that an encryption mode in the prior art may reduce the security of stored standard passwords. The method includes the following steps that: a plaintext character string is acquired; the acquired plaintext character string is encrypted through adopting at least two kinds of encryption algorithms, so that at least two corresponding ciphertext character strings can be obtained; characters are intercepted from each kind of obtained ciphertext character strings; and the encryption result of encryption performed on the plaintext character string can be obtained according to the intercepted characters. The encryption result obtained by using the above method contains the ciphertext character strings obtained after the encryption is performed with the different encryption algorithms, and the ciphertext character strings contained in the encryption result are not complete ciphertext character strings, but the incomplete intercepted character strings, and therefore, the encryption method can assist in effectively preventing the encryption result from being subjected to collision attack, violent attack or rainbow table comparison attack compared with an encryption method according to which a single encryption algorithm is adopted to perform encryption to obtain complete ciphertext character strings, and therefore, the security of the encryption result can be improved.
Owner:ADVANCED NEW TECH CO LTD

A decryption hardware platform based on fpga

The invention discloses a decryption hardware platform based on an FPGA. The decryption hardware platform is characterized in that the decryption hardware platform comprises a forwarding logic FPGA module, N mutually-independent FPGA decryption sub-modules and an ARM management sub-module which are respectively connected with the forwarding logic FPGA module, and a power supply management module supplying power to the forwarding logic FPGA module, the N mutually-independent FPGA decryption sub-modules and the ARM management sub-module, wherein the N mutually-independent FPGA decryption sub-modules are respectively connected with the ARM management sub-module, and N is no less than 2. The decryption hardware platform provided by the invention meets the decryption requirements of different files and solves the problems that an existing decryption device is single in function and poor in universality. The FPGA has the advantages that the requirements of high-speed data transmission, interfaces and high-frequency data operation are met, high-speed data transmission and high-speed data transportation are realized, and the PFGA is externally provided with a high-speed large-capacity DDR3, so that the storage of rainbow tables is realized.
Owner:GUANGZHOU HUIRUI SITONG INFORMATION SCI & TECH CO LTD

A Quick Restoration Method for Word Encrypted Documents

ActiveCN106778292BAvoid the shortcomings of long passwords that cannot be crackedEffective recoveryDigital data protectionComputer hardwarePassword
The invention discloses a rapid restoring method for Word encrypted documents. The method comprises steps as follows: step one, a secret key rainbow table of restored Word documents is established; step two, decryption secrete keys of the encrypted documents are decoded; step three, original plaintext documents are reconstructed by use of the decryption secrete keys and structure information of Word documents. The method has the positive effects as follows: the rainbow table for decrypting the secrete keys is only needed to be generated once, and the generated rainbow table is suitable for restoring all encrypted documents; restoring is not related to the complexity of encryption passwords of encrypted documents, and the defect that a long password cannot be cracked with an existing document cracking method is overcome; Word encrypted documents of version 2003 can be effectively restored, and the success rate reaches 99% or above; the encrypted documents can be rapidly restored, tests prove that the average restoring time of the encrypted documents is within 3 min under the computation ability of ordinary desktop computers (with the basic frequency being 3.0 GHz or above), and actual demands for real-time decryption can be well met.
Owner:NO 30 INST OF CHINA ELECTRONIC TECH GRP CORP

Password Recovery System and Recovery Method Based on Extended Rainbow Table of Generator

A code recovery system and a recovery method based on a generator and an extended rainbow table belong to the technical field of computer safety and comprise an extended rainbow table generating module, a plurality of clients of an extended rainbow table recovering module and a server, wherein the server is connected with a plurality of network nodes and comprises a data mining module, a memorizer and a system initialization module. A user manages the work of the data mining module and the system initialization module of the server through managing the work of terminal networks. The data mining module of the server generates a generator dictionary; the system initialization module of the server generates a distributed initialized configuration file; the distributed initialized configuration file comprises generator dictionary information and is connected with the extended rainbow table generating module and the extended rainbow table recovering module of the network nodes and is used for transmitting system initialization configuration information. The code recovery system and the recovery method based on the generator and the extended rainbow table achieve the purpose that a long instruction rainbow table is generated within a receptible time range by reducing plaintext space and reduces the recovery time of an artificial instruction.
Owner:SHANGHAI JIAOTONG UNIV
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products