Computer Science ›› 2022, Vol. 49 ›› Issue (11A): 210900176-5.doi: 10.11896/jsjkx.210900176

• Information Security • Previous Articles     Next Articles

Study on Office Password Recovery Vectorization Technology Based on Sunway Many-core Processor

LI Hui1, HAN Lin2, TAO Hong-wei3, DONG Ben-song4   

  1. 1 School of Economics,Qingdao Agricultural University,Qingdao,Shandong 266109,China
    2 Henan Supercomputing Centre,Zhengzhou University,Zhengzhou 450000,China
    3 School of Computer and Communication Engineering,Zhengzhou University of Light Industry,Zhengzhou 450002,China
    4 School of Computer and Artificial Intelligence,Zhengzhou University of Economics and Business,Zhengzhou 451191,China
  • Online:2022-11-10 Published:2022-11-21
  • About author:LI Hui,born in 1978,Ph.D,lecturer.His main research interests include risk management and actuarial.
  • Supported by:
    Henan Province Major Science and Technology(201400210600).

Abstract: In order to meet the needs of data security in agricultural and rural big data applications,the paper combines the hot computing issues in Office password recovery and uses Sunway many-core processors as the hardware platform to provide a vectorized password solution method.The analysis of SHA-1 and AES functions is the core part of the method.Firstly,using the characteristics of Sunway many-core processors to conduct automatic vectorization research.Secondly,through dependency analysis,the manual vectorization process between plaintext blocks is described,and the feasibility conclusion of the method theory is given.Finally,to verify the correctness and effectiveness of the method,the encrypted documents of each version of Office are used as use cases,and multiple data tests are carried out.The test results are compared with the traditional password recovery tool and the open-source Hashcat password recovery tool.Experimental results show that the method can effectively improve the performance of password recovery.

Key words: Big data, Data decryption, SHA-1, AES, Vectorization

CLC Number: 

  • TP391
[1]ZHAN X,HONG J.Study on GPU-based password recovery for MS Office2003 document[C]//2012 7th International Confe-rence on Computer Science & Education(ICCSE).IEEE,2012:517-520.
[2]LU H.Research on Office Ciphertic Crack Technology Based on CUDA Architecture [D].Zhengzhou:PLA Information Engineering University,2014.
[3]HONG J,CHEN Z,HU J.Analysis of encryption mechanism in Office 2013[C]//2015 IEEE 9th International Conference on Anti-counterfeiting,Security,and Identification(ASID).IEEE,2015:29-32.
[4]LI J J.Research and Implementation of Document Password Recovery System [D].Chengdu:University of Electronic Science and Technology,2013.
[5]LI L P,ZHOU Q L,LI B.Method for implementing Office documentation in multi-core FPGA [J].Small Microcomputer System,2019,40(5):929-934.
[6]LI B,ZHOU Q L,SI X M.A new type of mixed beomabileon set recovery system [J].Journal of Computer,2018,41(12):2804-2822.
[7]LIU W,ZHENG L,ZHENG K,et al.Method of NSGA-II Parallel and Optimization Based on Nuclear Processor [J].Computer Application Research,2020,37(1):96-101.
[8]GU W J,SUN C,WANG B.Research and Application of Parallel Optimization of High Performance Computing Based on OpenAcc [J].Computer Technology and Development,2018,28(4):65-70.
[9]DONGARRA J.Report on the Sunway TaihuLight System.University of Tennessee Department of Electrical Engineering and Computer Science Tech:Report UT-EECS16-742[R].2016.
[10]MERRILL N.Better Not to Know? The SHA1 Collision & the Limits of Polemic Computation[C]//Proceedings of the 2017 Workshop on Computing Within Limits.2017:37-42.
[11]LI L,FANG J,JIANG J,et al.Efficient AES implementation on Sunway TaihuLight supercomputer:A systematic approach[J].Journal of Parallel and Distributed Computing,2020,138:178-189.
[12]CHEN D X,LIU X.Design and optimization of the light parallel program of Shenwei Taihu [M/OL].2017.http://www.nsccwx.cn.
[13]DONG W Q.Research and Implementation of Scalable Molecular Simulation Algorithm Based on Taihu Lake [D].Changsha:Hunan University,2018.
[14]GAO W,LI Y Y,SUN H H,et al.An improved control flow SIMD to quantization method [J].Journal of Software,2017,28(8):2046-2063.
[15]ZENG Q M.Research on the key technology of high-throughput rations based on ARMV8 [D].Guangzhou:South China University of Technology,2019.
[16]LI L,FANG J,JIANG J,et al.SW-AES:Accelerating AES Algorithm on the Sunway TaihuLight[C]//2017 IEEE International Symposium on Parallel and Distributed Processing with Applications and 2017 IEEE International Conference on Ubi-quitous Computing and Communications(ISPA/IUCC).IEEE,2017:1204-1211.
[1] HE Qiang, YIN Zhen-yu, HUANG Min, WANG Xing-wei, WANG Yuan-tian, CUI Shuo, ZHAO Yong. Survey of Influence Analysis of Evolutionary Network Based on Big Data [J]. Computer Science, 2022, 49(8): 1-11.
[2] CHEN Jing, WU Ling-ling. Mixed Attribute Feature Detection Method of Internet of Vehicles Big Datain Multi-source Heterogeneous Environment [J]. Computer Science, 2022, 49(8): 108-112.
[3] WANG Mei-shan, YAO Lan, GAO Fu-xiang, XU Jun-can. Study on Differential Privacy Protection for Medical Set-Valued Data [J]. Computer Science, 2022, 49(4): 362-368.
[4] SUN Xuan, WANG Huan-xiao. Capability Building for Government Big Data Safety Protection:Discussions from Technologicaland Management Perspectives [J]. Computer Science, 2022, 49(4): 67-73.
[5] WANG Qing-xu, DONG Li-jun, JIA Wei, LIU Chao, YANG Guang, WU Tie-jun. Vector Representation and Computation Based Dynamic Access Control in Open Environment [J]. Computer Science, 2022, 49(11A): 210900217-7.
[6] LI Hui, HAN Lin, YU Zhe, WANG Wei. Acceleration Method for Multidimensional Function Optimization Based on Artificial Bee Colony Algorithm [J]. Computer Science, 2022, 49(11A): 211200075-6.
[7] ZHANG Kang-wei, ZHANG Jing-wei, YANG Qing, HU Xiao-li, SHAN Mei-jing. DCPFS:Distributed Companion Patterns Mining Framework for Streaming Trajectories [J]. Computer Science, 2022, 49(11A): 211100268-10.
[8] WANG Jun, WANG Xiu-lai, PANG Wei, ZHAO Hong-fei. Research on Big Data Governance for Science and Technology Forecast [J]. Computer Science, 2021, 48(9): 36-42.
[9] YU Yue-zhang, XIA Tian-yu, JING Yi-nan, HE Zhen-ying, WANG Xiao-yang. Smart Interactive Guide System for Big Data Analytics [J]. Computer Science, 2021, 48(9): 110-117.
[10] WANG Li-mei, ZHU Xu-guang, WANG De-jia, ZHANG Yong, XING Chun-xiao. Study on Judicial Data Classification Method Based on Natural Language Processing Technologies [J]. Computer Science, 2021, 48(8): 80-85.
[11] WANG Xue-cen, ZHANG Yu, LIU Ying-jie, YU Ge. Evaluation of Quality of Interaction in Online Learning Based on Representation Learning [J]. Computer Science, 2021, 48(2): 207-211.
[12] TENG Jian, TENG Fei, LI Tian-rui. Travel Demand Forecasting Based on 3D Convolution and LSTM Encoder-Decoder [J]. Computer Science, 2021, 48(12): 195-203.
[13] ZHANG Yu-long, WANG Qiang, CHEN Ming-kang, SUN Jing-tao. Survey of Intelligent Rain Removal Algorithms for Cloud-IoT Systems [J]. Computer Science, 2021, 48(12): 231-242.
[14] LIU Ya-chen, HUANG Xue-ying. Research on Creep Feature Extraction and Early Warning Algorithm Based on Satellite MonitoringSpatial-Temporal Big Data [J]. Computer Science, 2021, 48(11A): 258-264.
[15] GU Shuang-jia, LIU Wan-ping, HUANG Dong. Application of Express Information Encryption Based on AES and QR [J]. Computer Science, 2021, 48(11A): 588-591.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!