Lightweight password encryption method and system

An encryption method and encryption system technology, applied in the field of lightweight password encryption methods and systems, can solve problems such as unfavorable transplantation expansion, reduced security, low security, etc. Effect

Inactive Publication Date: 2018-08-28
GUANGDONG EFLYCLOUD COMPUTING CO LTD
View PDF4 Cites 11 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] A secure hash function should at least meet the following conditions: ①The input length is arbitrary; ②The output length is fixed, and should be at least 128 bits according to the current existing computing technology; ③For each given input, calculate Its hash value is very easy; ④ It is computationally infeasible to construct two independent inputs with the same hash value
[0007] Although the one-way encryption of HASH is very concise, it is easy to be cracked by brute force, because the length of the summary generated by the algorithm is 128bit (16byte), and its security is low. Under the current computing power, it is easy to be cracked by exhaustive attacks. Security is gradually reduced with the increasing computing power of today's computers
Symmetric encryption of the plaintext key, this encryption method is relatively private, but it still cannot withstand the use of rainbow tables (pre-calculated tables used for inverse operations of encrypted hash functions, whose content is the hash value of cracked passwords) attack, and this encryption method is relatively cumbersome and heavy, which is not conducive to transplantation and expansion
And sometimes some relatively small websites have very little chance of being attacked, so more complex encryption methods are not suitable for use
[0008] All in all, in the existing technology, there is no technical solution that is conducive to transplantation and expansion and is not easy to be cracked by brute force attack

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Lightweight password encryption method and system
  • Lightweight password encryption method and system
  • Lightweight password encryption method and system

Examples

Experimental program
Comparison scheme
Effect test

Example Embodiment

[0029] In the following, the concept, specific structure, and technical effects of the present disclosure will be clearly and completely described in conjunction with the embodiments and the drawings, so as to fully understand the objectives, solutions, and effects of the present disclosure. It should be noted that the embodiments in the application and the features in the embodiments can be combined with each other if there is no conflict. The same reference numerals used throughout the drawings indicate the same or similar parts.

[0030] figure 1 Shown is a flowchart of a password encryption method according to an embodiment of the present disclosure, which is combined with figure 1 The password encryption method according to the embodiment of the present disclosure is explained.

[0031] In this embodiment, a lightweight password encryption method is provided. According to an aspect of the present disclosure, a lightweight password encryption method is provided, which includes the

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention provides a lightweight password encryption method. The method comprises the following steps: step one, acquiring a user name and plaintext password input by a user; step two, generatinga salt random number A1 through the user name; step three, performing the first layer of encryption on the plaintext password of the user to generate an encrypted character string A2; step four, performing character string connection on the A1 and A2 to obtain an encrypted character string A3; and five, performing the second layer of encryption on the encrypted combined character string A3 to obtain the final encrypted password A4 after accomplishing the encryption step. Furthermore, the invention further provides a lightweight password encryption system. Through the method and system provided by the invention, a reliable encrypted password can be quickly obtained, thereby preventing the password from being easily stolen and the security of the project from being damaged; the method is infavor of transplanting and extending, and the encryption complexity is greatly reduced.

Description

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Owner GUANGDONG EFLYCLOUD COMPUTING CO LTD
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products