计算机科学 ›› 2022, Vol. 49 ›› Issue (11A): 210900176-5.doi: 10.11896/jsjkx.210900176

• 信息安全 • 上一篇    下一篇

基于申威众核处理器的Office口令恢复向量化研究

李辉1, 韩林2, 陶红伟3, 董本松4   

  1. 1 青岛农业大学经济学院 山东 青岛 266109
    2 郑州大学河南省超级计算中心 郑州 450000
    3 郑州轻工业大学计算机与通信工程学院 郑州 450002
    4 郑州经贸学院计算机与人工智能学院 郑州 451191
  • 出版日期:2022-11-10 发布日期:2022-11-21
  • 通讯作者: 李辉(leephil@163.com)
  • 基金资助:
    河南省重大科技专项(201400210600)

Study on Office Password Recovery Vectorization Technology Based on Sunway Many-core Processor

LI Hui1, HAN Lin2, TAO Hong-wei3, DONG Ben-song4   

  1. 1 School of Economics,Qingdao Agricultural University,Qingdao,Shandong 266109,China
    2 Henan Supercomputing Centre,Zhengzhou University,Zhengzhou 450000,China
    3 School of Computer and Communication Engineering,Zhengzhou University of Light Industry,Zhengzhou 450002,China
    4 School of Computer and Artificial Intelligence,Zhengzhou University of Economics and Business,Zhengzhou 451191,China
  • Online:2022-11-10 Published:2022-11-21
  • About author:LI Hui,born in 1978,Ph.D,lecturer.His main research interests include risk management and actuarial.
  • Supported by:
    Henan Province Major Science and Technology(201400210600).

摘要: 为了满足农业农村大数据应用中数据安全的需求,文章结合Office口令恢复中的计算热点问题,以申威众核处理器为硬件平台,提供了一种向量化密码解算方法。SHA-1和AES函数的解析是方法的核心部分。首先,利用申威众核处理器的特点,对其进行自动向量化研究;其次,通过依赖性分析描述了明文块之间手动向量化过程,给出方法理论层面的可行性结论;最后,为验证方法的正确性和有效性,将Office各个版本的加密文档作为用例,开展多重数据测试,测试结果与传统的口令恢复工具和开源的Hashcat口令恢复工具进行对比。实验结果表明,方法能够有效地提高口令恢复的性能。

关键词: 大数据, 数据解密, SHA-1, AES, 向量化

Abstract: In order to meet the needs of data security in agricultural and rural big data applications,the paper combines the hot computing issues in Office password recovery and uses Sunway many-core processors as the hardware platform to provide a vectorized password solution method.The analysis of SHA-1 and AES functions is the core part of the method.Firstly,using the characteristics of Sunway many-core processors to conduct automatic vectorization research.Secondly,through dependency analysis,the manual vectorization process between plaintext blocks is described,and the feasibility conclusion of the method theory is given.Finally,to verify the correctness and effectiveness of the method,the encrypted documents of each version of Office are used as use cases,and multiple data tests are carried out.The test results are compared with the traditional password recovery tool and the open-source Hashcat password recovery tool.Experimental results show that the method can effectively improve the performance of password recovery.

Key words: Big data, Data decryption, SHA-1, AES, Vectorization

中图分类号: 

  • TP391
[1]ZHAN X,HONG J.Study on GPU-based password recovery for MS Office2003 document[C]//2012 7th International Confe-rence on Computer Science & Education(ICCSE).IEEE,2012:517-520.
[2]LU H.Research on Office Ciphertic Crack Technology Based on CUDA Architecture [D].Zhengzhou:PLA Information Engineering University,2014.
[3]HONG J,CHEN Z,HU J.Analysis of encryption mechanism in Office 2013[C]//2015 IEEE 9th International Conference on Anti-counterfeiting,Security,and Identification(ASID).IEEE,2015:29-32.
[4]LI J J.Research and Implementation of Document Password Recovery System [D].Chengdu:University of Electronic Science and Technology,2013.
[5]LI L P,ZHOU Q L,LI B.Method for implementing Office documentation in multi-core FPGA [J].Small Microcomputer System,2019,40(5):929-934.
[6]LI B,ZHOU Q L,SI X M.A new type of mixed beomabileon set recovery system [J].Journal of Computer,2018,41(12):2804-2822.
[7]LIU W,ZHENG L,ZHENG K,et al.Method of NSGA-II Parallel and Optimization Based on Nuclear Processor [J].Computer Application Research,2020,37(1):96-101.
[8]GU W J,SUN C,WANG B.Research and Application of Parallel Optimization of High Performance Computing Based on OpenAcc [J].Computer Technology and Development,2018,28(4):65-70.
[9]DONGARRA J.Report on the Sunway TaihuLight System.University of Tennessee Department of Electrical Engineering and Computer Science Tech:Report UT-EECS16-742[R].2016.
[10]MERRILL N.Better Not to Know? The SHA1 Collision & the Limits of Polemic Computation[C]//Proceedings of the 2017 Workshop on Computing Within Limits.2017:37-42.
[11]LI L,FANG J,JIANG J,et al.Efficient AES implementation on Sunway TaihuLight supercomputer:A systematic approach[J].Journal of Parallel and Distributed Computing,2020,138:178-189.
[12]CHEN D X,LIU X.Design and optimization of the light parallel program of Shenwei Taihu [M/OL].2017.http://www.nsccwx.cn.
[13]DONG W Q.Research and Implementation of Scalable Molecular Simulation Algorithm Based on Taihu Lake [D].Changsha:Hunan University,2018.
[14]GAO W,LI Y Y,SUN H H,et al.An improved control flow SIMD to quantization method [J].Journal of Software,2017,28(8):2046-2063.
[15]ZENG Q M.Research on the key technology of high-throughput rations based on ARMV8 [D].Guangzhou:South China University of Technology,2019.
[16]LI L,FANG J,JIANG J,et al.SW-AES:Accelerating AES Algorithm on the Sunway TaihuLight[C]//2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubi-quitous Computing and Communications(ISPA/IUCC).IEEE,2017:1204-1211.
[1] 何强, 尹震宇, 黄敏, 王兴伟, 王源田, 崔硕, 赵勇.
基于大数据的进化网络影响力分析研究综述
Survey of Influence Analysis of Evolutionary Network Based on Big Data
计算机科学, 2022, 49(8): 1-11. https://doi.org/10.11896/jsjkx.210700240
[2] 陈晶, 吴玲玲.
多源异构环境下的车联网大数据混合属性特征检测方法
Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment
计算机科学, 2022, 49(8): 108-112. https://doi.org/10.11896/jsjkx.220300273
[3] 孙轩, 王焕骁.
政务大数据安全防护能力建设:基于技术和管理视角的探讨
Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives
计算机科学, 2022, 49(4): 67-73. https://doi.org/10.11896/jsjkx.211000010
[4] 王美珊, 姚兰, 高福祥, 徐军灿.
面向医疗集值数据的差分隐私保护技术研究
Study on Differential Privacy Protection for Medical Set-Valued Data
计算机科学, 2022, 49(4): 362-368. https://doi.org/10.11896/jsjkx.210300032
[5] 张康威, 张敬伟, 杨青, 胡晓丽, 单美静.
DCPFS:分布式轨迹流伴随模式挖掘框架
DCPFS:Distributed Companion Patterns Mining Framework for Streaming Trajectories
计算机科学, 2022, 49(11A): 211100268-10. https://doi.org/10.11896/jsjkx.211100268
[6] 王清旭, 董理君, 贾伟, 刘超, 杨光, 吴铁军.
开放式环境下基于向量表征与计算的动态访问控制
Vector Representation and Computation Based Dynamic Access Control in Open Environment
计算机科学, 2022, 49(11A): 210900217-7. https://doi.org/10.11896/jsjkx.210900217
[7] 李辉, 韩林, 于哲, 王威.
基于人工蜂群算法的多维函数优化加速方法
Acceleration Method for Multidimensional Function Optimization Based on Artificial Bee Colony Algorithm
计算机科学, 2022, 49(11A): 211200075-6. https://doi.org/10.11896/jsjkx.211200075
[8] 王博漾, 庞建民, 徐金龙, 赵捷, 陶小涵, 朱雨.
基于多面体模型的矩阵乘法向量代码生成
Matrix Multiplication Vector Code Generation Based on Polyhedron Model
计算机科学, 2022, 49(10): 44-51. https://doi.org/10.11896/jsjkx.210800247
[9] 王俊, 王修来, 庞威, 赵鸿飞.
面向科技前瞻预测的大数据治理研究
Research on Big Data Governance for Science and Technology Forecast
计算机科学, 2021, 48(9): 36-42. https://doi.org/10.11896/jsjkx.210500207
[10] 余乐章, 夏天宇, 荆一楠, 何震瀛, 王晓阳.
面向大数据分析的智能交互向导系统
Smart Interactive Guide System for Big Data Analytics
计算机科学, 2021, 48(9): 110-117. https://doi.org/10.11896/jsjkx.200900083
[11] 王立梅, 朱旭光, 汪德嘉, 张勇, 邢春晓.
基于深度学习的民事案件判决结果分类方法研究
Study on Judicial Data Classification Method Based on Natural Language Processing Technologies
计算机科学, 2021, 48(8): 80-85. https://doi.org/10.11896/jsjkx.210300130
[12] 王雪岑, 张昱, 刘迎婕, 于戈.
基于表示学习的在线学习交互质量评价方法
Evaluation of Quality of Interaction in Online Learning Based on Representation Learning
计算机科学, 2021, 48(2): 207-211. https://doi.org/10.11896/jsjkx.201000042
[13] 滕建, 滕飞, 李天瑞.
基于3D卷积和LSTM编码解码的出行需求预测
Travel Demand Forecasting Based on 3D Convolution and LSTM Encoder-Decoder
计算机科学, 2021, 48(12): 195-203. https://doi.org/10.11896/jsjkx.210400022
[14] 张育龙, 王强, 陈明康, 孙静涛.
图像去雨算法在云物联网应用中的研究综述
Survey of Intelligent Rain Removal Algorithms for Cloud-IoT Systems
计算机科学, 2021, 48(12): 231-242. https://doi.org/10.11896/jsjkx.201000055
[15] 曹萌, 于洋, 梁英, 史红周.
基于区块链的大数据交易关键技术与发展趋势
Key Technologies and Development Trends of Big Data Trade Based on Blockchain
计算机科学, 2021, 48(11A): 184-190. https://doi.org/10.11896/jsjkx.210100163
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!