期刊文献+

7-Zip加密文件快速口令恢复算法研究

Fast Password Recovery Algorithm for 7-Zip Encrypted Files
下载PDF
导出
摘要 随着7-Zip软件的广泛使用,快速恢复7-Zip加密文件口令对信息安全中的电子取证有着充分的现实意义。目前针对7-Zip加密文件的口令恢复问题,主要依靠219轮SHA256产生AES256密钥结合循环冗余校验(Cyclic Redundancy Check,CRC)校验码验证的方法,效率不高。通过研究7-Zip加密文件的明文统计特征,提出使用明文特征进行验证的快速口令恢复算法;通过分析7-Zip加密流程的脆弱性,提出使用密钥表进行解密的快速口令恢复算法。实验数据表明,设计的算法大幅度减少了计算量,在CPU上与目前业界使用最广泛的John破解软件相比,其口令破解速度可提升数千倍。 With the widespread use of 7-Zip software,the rapid recovery of 7-Zip encrypted file passwords is of practical significance for electronic forensics in information security.At present,the password recovery of 7-Zip encrypted files mainly depends on 219 rounds of SHA256 to generate AES256 keys combined with CRC verification code,which is inefficient.This paper proposes a fast password recovery algorithm using plaintext characteristics for verification by studying the plaintext statistical characteristics of 7-Zip encrypted files.By analyzing the vulnerability of 7-Zip encryption process,a fast password recovery algorithm using key table for decryption is proposed.The experimental data shows that the algorithm designed in this paper greatly reduces the amount of computation.Compared with the most widely used John cracking software in the industry,its password cracking speed can be improved thousands of times.
作者 程鹏文 颜学雄 章明 CHENG Pengwen;YAN Xuexiong;ZHANG Ming(Unit 61726,Wuhan 430079,China;Information Engineering University,Zhengzhou 450001,China)
机构地区 [ 信息工程大学
出处 《信息工程大学学报》 2024年第1期45-51,共7页 Journal of Information Engineering University
关键词 7-Zip软件 口令恢复 高级加密标准 安全散列算法2 7-Zip software password recovery advanced encryption standard secure hash algorithm 2
  • 相关文献

参考文献4

二级参考文献44

  • 1邵金祥,何志敏.基于FPGA的3DES加密算法高速实现[J].现代电子技术,2004,27(21):55-57. 被引量:8
  • 2黄本雄,鲍跃魁,胡海.3-DES算法的一种硬件实现[J].计算机与数字工程,2005,33(8):86-89. 被引量:4
  • 3NVIDIA.NVIDIA CUDA Programming Guide[EB/OL].http://developer.download.nvidia.com/compute/cuda/22 /toolkit/docs/NVIDIACUDAProgrammingGuide2.2.1.pdf,2009-5-26.
  • 4杨枝灵,王开,等.Visual C+ +数字图像获取处理及应用[M].人民邮电出版社,2003:173-180.
  • 5NVIDIA.NVIDIA CUDA Reference Manual[EB/OL].http://developer.download.nvidia.com/compute/cuda/22/toolkit/docs/CUDAReferenceManual2.2.pdf,2009-4.
  • 6PAUL C, KOCHER. Timing attacks on implementations of diffie-hellman, RSA, DSS, and other systems[A]. CRYPTO 96[C]. LNCS, Springer, 1996. 104-113.
  • 7KOCHER P, JAFFE J, JUN B. Differential power analysis[A]. Proc of Advances in Cryptology-CRYPTO '99[C]. LNCS, Springer, 1999.388-397.
  • 8QUISQUATER J J, SAMYDE D. Electromagnetic analysis(EMA): measures and countermeasures for smart cards[A]. E-Smart 2001[C]. LNCS, Springer, 2001. 200-210.
  • 9SHAMIR A, TROMER E. Acoustic cryptanalysis: on nosy people and noisy machines[EB/OL], http://www.wisdom, weizmann.ac.il/-tromer/acoustic/, 2004.
  • 10BONEH D, DEMILLO R A, LIPTON R J. On the importance of checking cryptographic protocols for faults[A]. Fumy, W Ed EUROCRYPT 1997[C]. Springer, 1997.37-51.

共引文献60

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部