Nothing Special   »   [go: up one dir, main page]

CN107491689A - A kind of password cracking method and apparatus - Google Patents

A kind of password cracking method and apparatus Download PDF

Info

Publication number
CN107491689A
CN107491689A CN201710560788.5A CN201710560788A CN107491689A CN 107491689 A CN107491689 A CN 107491689A CN 201710560788 A CN201710560788 A CN 201710560788A CN 107491689 A CN107491689 A CN 107491689A
Authority
CN
China
Prior art keywords
password
substring
space
gpu
num
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201710560788.5A
Other languages
Chinese (zh)
Other versions
CN107491689B (en
Inventor
查奇文
杜翠兰
杨博
李鹏霄
刘晓辉
段东圣
王晶
李扬曦
程光
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
National Computer Network and Information Security Management Center
Original Assignee
National Computer Network and Information Security Management Center
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by National Computer Network and Information Security Management Center filed Critical National Computer Network and Information Security Management Center
Priority to CN201710560788.5A priority Critical patent/CN107491689B/en
Publication of CN107491689A publication Critical patent/CN107491689A/en
Application granted granted Critical
Publication of CN107491689B publication Critical patent/CN107491689B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/45Structures or tools for the administration of authentication
    • G06F21/46Structures or tools for the administration of authentication by designing passwords or checking the strength of passwords
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L9/00Cryptographic mechanisms or cryptographic arrangements for secret or secure communications; Network security protocols

Landscapes

  • Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Theoretical Computer Science (AREA)
  • Computer Networks & Wireless Communication (AREA)
  • Signal Processing (AREA)
  • Computer Hardware Design (AREA)
  • Software Systems (AREA)
  • Physics & Mathematics (AREA)
  • General Engineering & Computer Science (AREA)
  • General Physics & Mathematics (AREA)
  • Document Processing Apparatus (AREA)
  • Storage Device Security (AREA)

Abstract

The invention discloses a kind of password cracking method and apparatus, method includes:CPU will treat that decryption is split as the form being made up of mask and substring according to presupposition analysis rule, and generate corresponding password password space respectively for mask and substring, and the password password space of substring is allocated into one or more GPU;One or more GPU generate a password password subspace all in accordance with the substring being divided into, permutation and combination is carried out all in accordance with the password password subspace and mask of each self-generating, complete password password space is generated, and treats decryption using complete password password space and is cracked.The password cracking method of the present invention can significantly reduce the quantity for treating permutation and combination caused by decryption, and by CPU and GPU cooperated computings, space caused by permutations of code combination is divided, the efficiency of password cracking is improved, solves problem of the prior art.

Description

A kind of password cracking method and apparatus
Technical field
The present invention relates to code-breaking techniques field, more particularly to a kind of password cracking method and apparatus.
Background technology
Currently, information security issue is increasingly taken seriously, and the research of cryptography is the basis of information security field, close It is one of important directions of cryptography that code, which cracks, and password cracking can be not only used for the fields such as public safety evidence obtaining, while also may be used Preferably to examine the security of cryptographic algorithm, promote the development of cryptographic algorithm.
Current most important password cracking method is Brute Force.Brute Force also makes exhaustive crack, and cracker will be close The character for being possible to use in code carries out exhaustive permutation and combination, and is verified one by one, is a kind of widely used password Crack means.Recently as the enhancing of user information safety consciousness, Password Length is generally arranged to more than 10, and wrap Spcial character is included, this password is referred to as strong cipher.Permutation and combination enormous amount caused by strong cipher is constructed, simple violence is broken Solution can not obtain the effect of practicality due to the limitation of computing capability and storage capacity.For example, using exhaustive crack method One 10 passwords that may include 95 kinds of all-characters are cracked, are passing through GPU (graphics processor, Graphics Processing Unit after) accelerating under conditions of 5,000,000,000 calculating speeds per second, generation 10 about needs comprising 95 kinds of all-character password spaces Time be 138597 days, about 380 years.
For cracking for strong cipher, due to permutation and combination enormous amount caused by password, traditional exhaustive crack method Single pass CPU (central processing unit, Central Processing Unit) or GPU carry out cracking computing, can not effectively break Deciphering;Simultaneously because computing resource consumption is being treated caused by decryption in the traversal of all permutation and combination, also result in The accumulation of multiple password cracking tasks.
The content of the invention
The present invention provides a kind of password cracking method and apparatus, to solve the following problem of prior art:Existing password Crack method single pass CPU or GPU carry out cracking computing, and use traveled through the fully intermeshing for treating decryption generation Mode, time-consuming and is easily caused the task that cracks accumulates.
For problem above, on the one hand, the present invention provides a kind of password cracking method, including:CPU advises according to presupposition analysis It will then treat that decryption is split as the form being made up of mask and substring, and distinguish for the mask and the substring Password password space corresponding to generation, the password password space of the substring is allocated to one or more GPU;Described one Individual or multiple GPU generate a password password subspace all in accordance with the substring being divided into, all in accordance with the institute of each self-generating State password password subspace and carry out permutation and combination with the mask, generate complete password password space, and using described complete close Treat that decryption cracks to described in code password space.
Optionally, the password password space of the substring is allocated to multiple GPU, including:The CPU is according to average The password password space of the substring is divided into multiple password password subspaces by the method for salary distribution;The CPU respectively will be every Substring corresponding to one password password subspace is allocated to a GPU.
Optionally, the password password space of the substring is being allocated to multiple GPU, including:The CPU is according to institute The length N for stating the character range L in substring and the substring determines sub- character described in the password password space The number of string is L n times power, is expressed as LN;The CPU is according to GPU number NUM, by the password password of the substring Space average is allocated to the multiple GPU, the model of substring in the password password subspace of the acquisition of each GPU Enclose respectively:[0,LN/NUM]、[LN/NUM,2*LN/NUM]、…、[(NUM-1)*LN/NUM,LN]。
Optionally, treat that decryption cracks to described using the complete password password space, including:By each Password in the complete password password space is filled in into Password Input mouth respectively as input deciphering, to detect the input Whether deciphering is proper password.
Optionally, using the complete password password space to it is described treat that decryption cracks after, in addition to:To User returns to password cracking result, and is presented on screen.
On the other hand, to achieve the above object, the present invention also provides a kind of password cracking device, including:First performs mould Block, for making CPU to treat that decryption is split as the form being made up of mask and substring according to presupposition analysis rule, and it is The mask and the substring generate corresponding password password space respectively, by the password password space of the substring It is allocated to one or more GPU;Second execution module, for making one or more of GPU all in accordance with the sub- word being divided into Symbol concatenates into a password password subspace, is arranged all in accordance with the password password subspace and the mask of each self-generating Row combination, complete password password space is generated, and treat that decryption is broken to described using the complete password password space Solution.
Optionally, first execution module, is specifically used for:
Make the CPU that the password password space of the substring are divided into multiple password mouths according to equalitarian distribution method Subspace is made, and substring corresponding to each described password password subspace is allocated to a GPU respectively.
Optionally, first execution module, is specifically additionally operable to:
Make character range Ls and the substring of the CPU in the substring length N determine it is described close The n times power that the number of substring is L described in code password space, is expressed as LN
The password password space average of the substring is allocated to described more by the CPU according to GPU number NUM Individual GPU, the scope of substring is respectively in the password password subspace of the acquisition of each GPU:
[0,LN/NUM]、[LN/NUM,2*LN/NUM]、…、[(NUM-1)*LN/NUM,LN]。
Optionally, second execution module, is specifically used for:
Password in each described complete password password space is filled in into Password Input as input deciphering Mouthful, whether it is proper password to detect the input deciphering.
Optionally, the password cracking device also includes:
Module is presented, for using the complete password password space to it is described treat that decryption cracks after, Password cracking result is returned to user, and is presented on screen.
The present invention will treat that decryption is split as the form being made up of mask and substring first, and be mask and sub- word Symbol string password password space corresponding to generation, and then the password password space of substring is allocated to one or more respectively GPU, one password password subspace is generated according to the substring being divided into by GPU, and according to the password mouth of each self-generating Make subspace carry out permutation and combination with mask, generate complete password password space, finally treated using complete password password space Decryption is cracked.This method can significantly reduce the quantity for treating permutation and combination caused by decryption, and by CPU and GPU cooperated computings, space caused by permutations of code combination is divided, the efficiency of password cracking is improved, solves existing The following problem of technology:Single pass CPU or GPU carry out cracking computing, and enter using by the fully intermeshing for treating decryption generation The mode of row traversal, time-consuming and is easily caused the task that cracks accumulates.
Brief description of the drawings
Fig. 1 is the flow chart of password cracking method in first embodiment of the invention;
Fig. 2 is the structural representation of password cracking device in second embodiment of the invention;
Fig. 3 is the schematic diagram that complete password password space is generated in third embodiment of the invention;
Fig. 4 is the flow chart that complete password password space is generated in third embodiment of the invention;
Fig. 5 is the flow chart of Password Cracker in third embodiment of the invention.
Embodiment
In order to solve problem of the prior art:Existing password crack method single pass CPU or GPU carry out cracking computing, And by the way of the fully intermeshing for treating decryption generation is traveled through, time-consuming and is easily caused the task that cracks accumulates;This hair Bright first embodiment provides a kind of password cracking method, and this method flow chart is as shown in figure 1, including step S102 to S104:
S102, CPU will treat that decryption is split as the form being made up of mask and substring according to presupposition analysis rule, And corresponding password password space is generated respectively for mask and substring, the password password space of substring is allocated to one Individual or multiple GPU;
S104, one or more GPU generate a password password subspace, equal root all in accordance with the substring being divided into Permutation and combination is carried out according to the password password subspace and mask of each self-generating, generates complete password password space, and using complete Treat decryption and cracked in password password space.
To improve password cracking efficiency, when the password password space of substring is allocated into multiple GPU, specifically may be used also With including:
The password password space of substring is divided into multiple password password subspaces by CPU according to equalitarian distribution method; Substring corresponding to each password password subspace is allocated to a GPU by CPU respectively.The substring being specifically divided Password password space expression it is as follows:
The length N of range L and substring corresponding to character types of the CPU in substring determines password password sky Between middle substring number be L n times power, be expressed as LN, LNNamely substring is caused by the password cracking task The number of permutation and combination, these permutation and combination form the password password space of substring;
After the caused permutation and combination of substring is determined, CPU according to the number NUM for cracking GPU in task, The password password space average of substring is allocated to multiple GPU, the password password subspace neutron word of each GPU acquisition According with the scope gone here and there is respectively:
[0,LN/NUM]、[LN/NUM,2*LN/NUM]、…、[(NUM-1)*LN/NUM,LN]。
For example, it is to crack the login password of a social network sites 9 to crack task, according to pre-defined rule (such as cipher word Allusion quotation analysis rule) to be analyzed, it is believed that password is made up of 4 letters and 5 bit digitals, and part alphabetical in password is defined as Mask, such as determined that mask is root by calculating in CPU, the task that cracks just is changed into other 5 bit digitals in password Crack, in embodiments of the present invention, this 5 bit digital is thus referred to as substring, and the length of substring is 5;Each digit The span of word is 0,1,2,3,4,5,6,7,8,90 numeral, i.e., character range be 10, substring to be cracked it is close Code password space is exactly the fully intermeshing of this five digit number, then the number for the character string that the password password space of substring includes is just It is 105It is individual, character string scope corresponding to the password password space of substring be exactly [00000,00001 ..., 99998, 99999];In the present embodiment, the number for cracking the GPU that task uses is 8, by the password password space average of substring This 8 GPU are allocated to, then the scope of substring is distinguished in the password password subspace of each GPU acquisition after mean allocation For:[00000,12499]、[12500,24999]、[25000,37499]、[37500,49999]、[50000,62499]、 [62500,74999]、[75000,87499]、[87500,99999];Each GPU divides the substring of acquisition according to CPU The possible arrangement of each character string in scope, it is combined one by one with above-mentioned caused mask root, just generates and crack Complete password password space in task.
When treating decryption using complete password password space and being cracked, by each complete password password space In password respectively as input deciphering fill in into Password Input mouth, with detection input deciphering whether be proper password.Though The right process is also to be iterated trial using the method for exhaustion, but the more original password quantity of the password quantity being an attempt to form it is huge Big difference, it can substantially accelerate to crack speed.
More intuitively know to crack result in order to facilitate the user of decryption, in using complete password password space Password treat after decryption cracked, password cracking result can also be returned to user, and be on screen It is existing, user is learnt the result of password cracking, improve Consumer's Experience.
The password cracking method of first embodiment of the invention, it will treat that decryption is split as by mask and substring first The form of composition, and for mask and substring generate respectively corresponding to password password space, and then by the password of substring Password space is allocated to one or more GPU, and password password is generated according to the substring being divided into by each GPU Space, and permutation and combination is carried out according to the password password subspace and mask of each self-generating, complete password password space is generated, most Decryption is treated using complete password password space afterwards to be cracked.This method, which can significantly reduce, treats that decryption produces Permutation and combination quantity, and by CPU and GPU cooperated computing, space caused by permutations of code combination is divided, improved The efficiency of password cracking, solves the following problem of prior art:Single pass CPU or GPU carry out cracking computing, and use will The mode that the fully intermeshing of decryption generation is traveled through is treated, time-consuming and is easily caused the task that cracks accumulates.
The second embodiment of the present invention provides a kind of password cracking device, and the structural representation of the device is as shown in Fig. 2 bag Include:First execution module 10, for making CPU to treat that decryption is split as by mask and substring according to presupposition analysis rule The form of composition, and corresponding password password space is generated respectively for mask and substring, by the password password of substring Space is allocated to one or more GPU;Second execution module 20, coupled with the first execution module 10, for making one or more GPU generates a password password subspace all in accordance with the substring being divided into, all in accordance with password password of each self-generating Space and mask carry out permutation and combination, generate complete password password space, and treated using complete password password space crack it is close Code is cracked.
For improve password cracking efficiency, the first execution module by the password password space of substring be allocated to one or During multiple GPU, the function of specific implementation is:CPU is set to divide the password password space of substring according to equalitarian distribution method For multiple password password subspaces, and substring corresponding to each password password subspace is allocated to a GPU respectively.
When first execution module states function in realization, the expression in the password password space for the substring being specifically divided It is as follows:
Character range Ls and substring of the CPU in substring length N is set to determine password password space neutron word The n times power that the number of symbol string is L, is expressed as LN, LNNamely substring caused permutation and combination in the password cracking task Number, these permutation and combination form the password password space of substring;
After the caused permutation and combination of substring is determined, CPU according to the number NUM for cracking GPU in task, The password password space average of substring is allocated to multiple GPU, the password password subspace neutron word of each GPU acquisition According with the scope gone here and there is respectively:
[0,LN/NUM]、[LN/NUM,2*LN/NUM]、…、[(NUM-1)*LN/NUM,LN]。
For example, it is to crack the login password of a social network sites 9 to crack task, first in the present embodiment performs mould Root tuber is analyzed according to pre-defined rule (such as password dictionary analysis rule), it is believed that and password is made up of 4 letters and 5 bit digitals, and Part alphabetical in password is defined as mask, such as has determined that mask is root by calculating in CPU, task is cracked and just turns It is changed into cracking other 5 bit digitals in password, in the present embodiment, this 5 bit digital is thus referred to as substring, substring Length be 5;Substring is made up of numeral, then the span of each bit digital is exactly 0,1,2,3,4,5,6,7,8,90 Individual numeral, i.e. character range are 10, and the password password space of substring to be cracked is exactly the fully intermeshing of this five digit number, then The number for the character string that the password password space of substring includes is exactly 105Individual, the password password space of substring is corresponding Character string scope be exactly [00000,00001 ..., 99998,99999];In the present embodiment, crack the GPU's that task uses Number is 8, and the password password space average of substring is allocated into this 8 GPU, then each GPU is obtained after mean allocation The scope of substring is respectively in the password password subspace obtained:[00000,12499]、[12500,24999]、[25000, 37499]、[37500,49999]、[50000,62499]、[62500,74999]、[75000,87499]、[87500,99999]; And then second execution module make each GPU according to CPU divide obtain substring scope in each character string may Arrangement, be combined one by one with above-mentioned caused mask root, just generate complete password password space in the task of cracking.
In the present embodiment, after complete password password space is generated, the second execution module is additionally operable to:
Filled in the password in each complete password password space as input deciphering into Password Input mouth, with Whether detection input deciphering is proper password.Although the process is also to be iterated trial using the method for exhaustion, it is an attempt to The more original password quantity of password quantity forms huge difference, can substantially accelerate to crack speed.
More intuitively know to crack result in order to facilitate the user of decryption, it is close in second embodiment of the invention Code breaking device also includes:
Module is presented, for after decryption is treated using complete password password space and is cracked, being returned to user Password cracking result is returned, and is presented on screen.The function that the module is realized makes user learn the result of password cracking, carries High Consumer's Experience.
The password cracking device of second embodiment of the invention, the first execution module will treat decryption be split as by mask and The form of substring composition, and for mask and substring generate respectively corresponding to password password space, and then by sub- character The password password space of string is allocated to one or more GPU;Second execution module makes each GPU according to the sub- character being divided into Concatenate into a password password subspace, and permutation and combination is carried out according to the password password subspace and mask of each self-generating, it is raw Into complete password password space, finally treat decryption using complete password password space and cracked.This password cracking Device decryption, can significantly reduce the quantity for treating permutation and combination caused by decryption, and by CPU and GPU cooperated computings, Space caused by permutations of code combination is divided, improves the efficiency of password cracking, the following of prior art is solved and asks Topic:Single pass CPU or GPU carry out cracking computing, and by the way of the fully intermeshing for treating decryption generation is traveled through, Time-consuming and is easily caused the task that cracks accumulates.
Third embodiment of the invention provides a kind of password cracking method, and this method can solve the following of prior art and ask Topic:In the case of multiple password cracking tasks, treat that the password password of all fully intermeshings of decryption is empty using GPU constructions Between, cause password cracking time length, task to be accumulated using Brute Force method serious.
The problem of above-mentioned be present for prior art, the embodiment of the present invention will be treated brokenly using pre-defined rule generation mask Deciphering is divided into the form that mask combines with substring, and gives substring to GPU processing by CPU, and GPU generates sub- character Password password space corresponding to string, and each substring in the password password space is carried out with the mask in CPU respectively Combination, obtains complete password password space, then carry out trial to the password in complete password password space by GPU and crack. Compared with prior art, this method can quickly generate complete password password space, be more suitable in limited time range Rapidly crack the situation of long password.
The detailed process of the present embodiment is as follows, including:
(1) process of a password space division is present embodiments provided.
Because user sets the custom of password usually to meet certain rule, according to existing social engineering achievement or password Dictionary rule, rule can be set to analyze user cipher, obtain treating the possible composition rule of decryption, so as to construct Password password space with mask.For example, conventional password setting rule is:Fixed character string S and number combinatorics on words shape Formula, is the password with mask by this kind of password definition, and fixed character string S is referred to as into mask, and numeral below is sub- character String.Mask { S, M } and sub_charset { L, N } combination will be arranged on complete password password space form;Wherein, S is represented The character string of mask, M represent the string length of mask, and L represents scope corresponding to character types in substring, and N represents son Password space length.Certainly, in some cases, the position of mask and substring can adjust, and can be son according to demand Before character string is arranged on, after mask is arranged on.
(2) process in the password password space using CPU construction substrings is present embodiments provided.
After mask determination, password cracking is changed into cracking sub- string portions, and substring is generated by CPU Password password space, rule is set according to above-mentioned password, the password password space of substring is by character types in substring Corresponding range L, and the string length N of substring determine, substring in the password password space of substring Number is L n times power, is expressed as LN, CPU is that each GPU equipment distributes corresponding password mouth according to the number NUM of GPU equipment Make space, the scope of substring is respectively in the password password subspace of each GPU acquisition:
[0,LN/NUM]、[LN/NUM,2*LN/NUM]、…、[(NUM-1)*LN/NUM,LN]。
(3) process in a complete password space of generation is present embodiments provided.
The password password space of substring is divided by CPU, each GPU is according to the password mouth of the substring being divided into Character string scope generation password password subspace corresponding to space is made, further, mask and password password subspace are arranged Row combination, generates complete password password space, generates the schematic diagram in complete password password space as shown in figure 3, generation is complete close The flow chart in code password space is as shown in figure 4, complete password is expressed as password { S+L, M+N } in form.
(4) process that password cracking is carried out using GPU is present embodiments provided.
GPU treats decryption using the complete password password space of generation and cracked, and cracks and is successfully recorded, Processing Next Password cracks task.To not cracking success yet after complete password password space traversal, then abandon this and crack task, Abandon cracking, the task is added into failure queue, processing Next Password cracks task.
In specific implementation, if from user perspective, password cracking method flow that the present embodiment provides can be with As shown in figure 5, specifically comprise the following steps:
(1) multiple password cracking tasks are deposited into task queue.
(2) a password cracking task is taken out from task queue.
(3) user determines mask rule in the case where cracking system interface.
To treat that decryption division rule is set, specifically, user determines mask create-rule and son according to real needs The character types and string length of character string.
(4) after receiving mask rule, cooperated by CPU and GPU according to mask rule and generate complete password password sky Between.
During realization, the generation of password space and division are first carried out, specifically, CPU generates mask according to user's request, The password password space of substring is generated simultaneously, according to GPU several password mouths that substring has been divided to each GPU equipment Make substring scope corresponding to space;The generation of complete password password space is carried out again, specifically, each GPU is according to being divided into Substring scope, generate corresponding password password subspace, and further generate complete password mouth with mask permutation and combination Make space.
(5) password cracking system is cracked using the complete password password space of generation, is recorded and is shown to user broken Result is solved, after the password cracking task is completed, goes to step (2), until task queue is sky.
When password cracking and result are presented, cracking programs are treated the task that cracks using complete password password space and carried out thoroughly Act formula Brute Force, and result will be cracked and return to user.
The password cracking method that the present embodiment provides, password is constructed using mask, the password password space of generation is reduced To high probability scope, the time of decryption can be effectively reduced.
Included for example, cracking 10 in computer system exemplified by the password of 95 kinds of alphabet species, GPU is every with 5,000,000,000 times The computing capability of second, 10 complete password password spaces comprising 95 kinds of alphabet species of generation need 138597 days.It is if logical Cross social engineering method or password dictionary is analyzed, the password is started with character " root ", and user can set the mask to be " root ", then construct mask only needs for 10 complete password password spaces for including alphabet species in 95 of " root " 147 seconds.
The password cracking method of third embodiment of the invention, it will treat that decryption is split as by mask and substring first The form of composition, and for mask and substring generate respectively corresponding to password password space, and then by the password of substring Password space is allocated to one or more GPU, and password password is generated according to the substring being divided into by each GPU Space, and permutation and combination is carried out according to the password password subspace and mask of each self-generating, complete password password space is generated, most Decryption is treated using complete password password space afterwards to be cracked.This method, which can significantly reduce, treats that decryption produces Permutation and combination quantity, and by CPU and GPU cooperated computing, space caused by permutations of code combination is divided, improved The efficiency of password cracking, solves the following problem of prior art:Single pass CPU or GPU carry out cracking computing, and use will The mode that the fully intermeshing of decryption generation is traveled through is treated, time-consuming and is easily caused the task that cracks accumulates.
Based on the above method, the present embodiment also proposed a kind of password cracking system, including:
Task generation module (equivalent to the partial function of the first execution module in second embodiment of the invention), division module (equivalent to the partial function of the first execution module in second embodiment of the invention), crack module (equivalent to the present invention second in fact Apply the second execution module in example), user's enquiry module (equivalent to the presentation module in second embodiment of the invention).
Task generation module:For generating the task that cracks, and this is cracked into task and is stored in buffer queue for subsequent module Use.
Division module:For determining mask and treating that decryption is expressed as the form that mask combines with substring, enter And generate the password password space of substring using CPU and divided in password password space according to GPU quantity.
Crack module:Each GPU character string scopes according to corresponding to the password password space for the substring being divided into, it is raw Into respective password password subspace, each password password subspace carries out rehearsal with mask and combined, and generates complete password space. The task that cracks is treated according to the complete password space of generation and carries out Brute Force, and records and cracks result.
User's enquiry module:The execution stage of password cracking task is returned to according to the request of user and shows password cracking knot Fruit.
Although being example purpose, the preferred embodiments of the present invention are had been disclosed for, those skilled in the art will recognize Various improvement, increase and substitution are also possible, and therefore, the scope of the present invention should be not limited to above-described embodiment.

Claims (10)

  1. A kind of 1. password cracking method, it is characterised in that including:
    CPU will treat that decryption is split as the form being made up of mask and substring according to presupposition analysis rule, and be described Mask and the substring generate corresponding password password space respectively, and the password password space of the substring is divided To one or more GPU;
    One or more of GPU generate a password password subspace all in accordance with the substring being divided into, all in accordance with each The password password subspace of self-generating carries out permutation and combination with the mask, generates complete password password space, and use Treat that decryption cracks to described in the complete password password space.
  2. 2. password cracking method as claimed in claim 1, the password password space of the substring is allocated to multiple GPU, including:
    The password password space of the substring is divided into multiple password password skies by the CPU according to equalitarian distribution method Between;
    Substring corresponding to each described password password subspace is allocated to a GPU by the CPU respectively.
  3. 3. password cracking method as claimed in claim 2, multiple the password password space of the substring is allocated to GPU, including:
    Character range Ls and the substring of the CPU in the substring length N determine the password password The number of substring described in space is L n times power, is expressed as LN
    The password password space average of the substring is allocated to the multiple by the CPU according to GPU number NUM GPU, the scope of substring is respectively in the password password subspace of the acquisition of each GPU:
    [0,LN/NUM]、[LN/NUM,2*LN/NUM]、…、[(NUM-1)*LN/NUM,LN]。
  4. 4. password cracking method as claimed in claim 1, it is characterised in that using the complete password password space to described Treat that decryption is cracked, including:
    Password in each described complete password password space is filled in into Password Input mouth as input deciphering, with Detect whether the input deciphering is proper password.
  5. 5. the password cracking method as any one of Claims 1-4, it is characterised in that use the complete password mouth Make space to it is described treat that decryption cracks after, in addition to:
    Password cracking result is returned to user, and is presented on screen.
  6. A kind of 6. password cracking device, it is characterised in that including:
    First execution module, for making CPU to treat that decryption is split as by mask and substring according to presupposition analysis rule The form of composition, and corresponding password password space is generated respectively for the mask and the substring, by the sub- character The password password space of string is allocated to one or more GPU;
    Second execution module, for making one or more of GPU generate a password all in accordance with the substring being divided into Password subspace, permutation and combination is carried out all in accordance with the password password subspace and the mask of each self-generating, generation is complete Password password space, and treat that decryption cracks to described using the complete password password space.
  7. 7. password cracking device as claimed in claim 6, first execution module, are specifically used for:
    Make the CPU that the password password space of the substring are divided into multiple password password according to equalitarian distribution method Space, and substring corresponding to each described password password subspace is allocated to a GPU respectively.
  8. 8. password cracking device as claimed in claim 7, first execution module, are specifically additionally operable to:
    Character range Ls and the substring of the CPU in the substring length N is set to determine the password mouth The n times power that the number for making substring described in space is L, is expressed as LN
    The password password space average of the substring is allocated to the multiple by the CPU according to GPU number NUM GPU, the scope of substring is respectively in the password password subspace of the acquisition of each GPU:
    [0,LN/NUM]、[LN/NUM,2*LN/NUM]、…、[(NUM-1)*LN/NUM,LN]。
  9. 9. password cracking device as claimed in claim 6, it is characterised in that second execution module, be specifically used for:
    Password in each described complete password password space is filled in into Password Input mouth as input deciphering, with Detect whether the input deciphering is proper password.
  10. 10. the password cracking device as any one of claim 6 to 9, it is characterised in that also include:
    Module is presented, for using the complete password password space to it is described treat that decryption cracks after, Xiang Yong Family returns to password cracking result, and is presented on screen.
CN201710560788.5A 2017-07-11 2017-07-11 Password cracking method and device Expired - Fee Related CN107491689B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201710560788.5A CN107491689B (en) 2017-07-11 2017-07-11 Password cracking method and device

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201710560788.5A CN107491689B (en) 2017-07-11 2017-07-11 Password cracking method and device

Publications (2)

Publication Number Publication Date
CN107491689A true CN107491689A (en) 2017-12-19
CN107491689B CN107491689B (en) 2020-10-16

Family

ID=60644405

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201710560788.5A Expired - Fee Related CN107491689B (en) 2017-07-11 2017-07-11 Password cracking method and device

Country Status (1)

Country Link
CN (1) CN107491689B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112019354B (en) * 2020-11-02 2021-02-09 之江实验室 Password traversal device and method based on generating type countermeasure network
CN112597479A (en) * 2020-12-01 2021-04-02 中国科学院信息工程研究所 GPU-based hybrid cracking mode optimization method and device for password
CN112861113A (en) * 2021-01-08 2021-05-28 复旦大学 Password guessing method of parameterized hybrid model

Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684754A (en) * 2013-12-03 2014-03-26 中国电子科技集团公司第三十研究所 WPA shared key cracking system based on GPU cluster
CN104077542A (en) * 2014-07-10 2014-10-01 南威软件股份有限公司 Password cracking system and method
CN104182208A (en) * 2014-08-08 2014-12-03 北京锐安科技有限公司 Method and system utilizing cracking rule to crack password
CN104615945A (en) * 2015-02-04 2015-05-13 中国电子科技集团公司第三十研究所 Code cracking method and system based on multiple GPU cracking devices

Patent Citations (4)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103684754A (en) * 2013-12-03 2014-03-26 中国电子科技集团公司第三十研究所 WPA shared key cracking system based on GPU cluster
CN104077542A (en) * 2014-07-10 2014-10-01 南威软件股份有限公司 Password cracking system and method
CN104182208A (en) * 2014-08-08 2014-12-03 北京锐安科技有限公司 Method and system utilizing cracking rule to crack password
CN104615945A (en) * 2015-02-04 2015-05-13 中国电子科技集团公司第三十研究所 Code cracking method and system based on multiple GPU cracking devices

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN112019354B (en) * 2020-11-02 2021-02-09 之江实验室 Password traversal device and method based on generating type countermeasure network
CN112597479A (en) * 2020-12-01 2021-04-02 中国科学院信息工程研究所 GPU-based hybrid cracking mode optimization method and device for password
CN112597479B (en) * 2020-12-01 2024-06-18 中国科学院信息工程研究所 GPU-based hybrid cracking mode optimization method and device for password passwords
CN112861113A (en) * 2021-01-08 2021-05-28 复旦大学 Password guessing method of parameterized hybrid model
CN112861113B (en) * 2021-01-08 2022-05-20 复旦大学 Password guessing method of parameterized mixed model

Also Published As

Publication number Publication date
CN107491689B (en) 2020-10-16

Similar Documents

Publication Publication Date Title
Tong et al. Accelerating decision tree based traffic classification on FPGA and multicore platforms
Ur et al. Measuring {Real-World} Accuracies and Biases in Modeling Password Guessability
Alani Testing randomness in ciphertext of block-ciphers using DieHard tests
CN110572362B (en) Network attack detection method and device for multiple types of unbalanced abnormal traffic
Liu et al. A byte-level CNN method to detect DNS tunnels
CN110570346B (en) Method for performing style migration on calligraphy based on cyclic generation countermeasure network
CN117278325B (en) Computer network big data safety protection method and system
CN107491689A (en) A kind of password cracking method and apparatus
CN109388565B (en) Software system performance optimization method based on generating type countermeasure network
CN110347501A (en) A kind of service testing method, device, storage medium and electronic equipment
CN109460676A (en) A kind of desensitization method of blended data, desensitization device and desensitization equipment
CN115883109B (en) Data compression encryption method and system for aviation system
CN114726823B (en) Domain name generation method, device and equipment based on generation countermeasure network
Horalek et al. Analysis of the use of Rainbow Tables to break hash
CN106570391A (en) Memory block based password guessing set generation method and memory block based digital password cracking method
CN111191253B (en) Data encryption combination method
CN113312609B (en) Password cracking method and system of generative confrontation network based on strategy gradient
CN117725598A (en) An Zhuoduan data encryption and decryption method, device, equipment and medium
CN117557708A (en) Image generation method, device, storage medium and computer equipment
CN104504156B (en) A kind of textstream methods of sampling based on compressive sensing theory
Li et al. Mimic computing for password recovery
CN115473734A (en) Remote code execution attack detection method based on single classification and federal learning
CN110162794A (en) A kind of method and server of participle
Baig et al. Bit rate reduction in cloud gaming using object detection technique
CN112597479A (en) GPU-based hybrid cracking mode optimization method and device for password

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20201016

Termination date: 20210711