Font Size: a A A

Design And Implementation Of Encrypted Document Cracking System

Posted on:2018-05-05Degree:MasterType:Thesis
Country:ChinaCandidate:L S LiFull Text:PDF
GTID:2348330536981607Subject:Software engineering
Abstract/Summary:PDF Full Text Request
In computer applications,Office and RAR are highly representative of the file processing applications.One is the most commonly used text or data logger.One is most commonly used for managing files.To meet the users' requirement for privacy,password setting becomes common.At the same time,poorly managed passwords lead to the problem of forgetting the passwords.Therefore,password cracking becomes necessary.This paper focuses on a system that can crack passwords for Office 2007,2010,2013,and RAR encrypted document using GPU as an instrument,and system's performance optimize.GPU as a new multi-core processor developed,its efficient computing performance is gaining more and more attention.The launch of CUDA further makes the GPU as a general-purpose co-processor.Relevant disciplines also have begun GPU related research.Encrypted document cracking system's work is divided into three parts:(1)The cracking of Office and RAR encrypted documents requires knowledge about document format and cryptography.This paper first introduces cryptography,CUDA programming model,and the encryption algorithm used in Office and RAR encrypted document.(2)Gives the details of Office and RAR document format,that extracts the file's encrypted strings used for password cracking.With an analysis of algorithm's use in Office and RAR application for documents' encryption.(3)Gives the design and implementation of this system,to crack different versions of Office encrypted documents,RAR different compression formats of encrypted documents on the GPU.According to the encryption algorithm analysis and GPU characteristics to achieve system's performance optimization and to achieve the purpose of fast crack.At the end of the paper,the function and performance of the system are verified.The paper counts the results of each type of encrypted document speed and different types of cracking strategies.The data show that the system passes the test.
Keywords/Search Tags:Office Encrypted Document, RAR Encrypted Document, GPU, Brute Force
PDF Full Text Request
Related items