Synopsis of Password Generator GUI
Synopsis of Password Generator GUI
Project
‘Password Manager & Generator’
Submitted to - Submitted by -
Contents
1. Introduction
2. System Requirements
3. Objective of the Project
4. Summary
5. Description
6. Methodology
7. Problem Statement
8. Existing System
9. Proposed System
10.Conclusion
11.Reference
Introduction
We know that password are a real security threat. To keep your account
safe and prevent your password from being hacked you to make your password
hard enough that nobody can guess.
B. Software requirement:
1. Python 2.8
2. VS Code
Objective of the project
A password generator software offers a good display of all your
credentials. As such, it saves you from memorizing hundreds of passwords
except the generator's login details. The primary objective of using a generator
is creation of strong and unpredictable passwords for all of your accounts.
Summary
A random password generator is software program or hardware device
that takes input from a random or pseudo-random number generator and
automatically generates a password. Random passwords can be generated
manually, using simple sources of randomness such as dice or coins, or they can
be generated using a computer.
We test the functionality of the password manager through their various apps as
well, as sometimes there can be noticeable differences between desktop and
mobile versions of the app. When testing ease-of-use, we underscore aspects
like:
Password Output and Use: There are many ways in which a generated
password could be transferred to the password field of a login page. Simplest is
manual copy and paste, as used by SSP ,where the password generator displays
the password, and the user copies it to the login page. A slightly more
automated approach is copy to clipboard in which the generated password is
copied to the clipboard; for security reasons the password can be made to only
reside in the clipboard for a limited period, e.g. in PasswordSitter the generated
password is saved to the clipboard for 60 seconds before being deleted .The
simplest approach for the user is probably automatic copying to the target
password field; this can either be done automatically, as is the case for
PwdHash in the web page implementation and the ObPwd Firefox browser
extension . Alternatively it can require the user to perform an action, e.g.
clicking a specific key combination, before copying; PassPet requires the user to
click on a screen button, and Password Multiplier, requires the user to double
click the password field or press ctrl+P to trigger password copying.
Proposed System
– For inputs, we propose the use of a master password, stored by the system (as
global configuration data), and a password (or PIN) to be entered by the user.
We also propose use of the first part of the URL of the site, where, depending
on the implementation, this should also be stored as part of the site-specific
configuration and used to retrieve the other site-specific data. The master
password can be held encrypted by a key derived from the user password. We
also propose the optional use of a digital object, where use of this option is
indicated in the site-specific configuration data.
– The precise option for password output and use depends on the
implementation. Where possible, auto-filling the password is desirable; where
this is impossible, the copy to clipboard/paste buffer approach is advocated.
Conclusion
Passwords are the last defense mechanism from online criminals trying to
access your sensitive data. Always aim at making things difficult for them by
using strong and unpredictable passwords. Thanks to the technicians who are
working relentlessly to ensure the development of robust authentication
systems. These systems have aided in reducing networking breeches and
ensuring data security.
Password generators can save you from fraud and other cyber security
threats by creating secure and strong passwords. However, all passwords are not
created equally. Understand how each password works to get the one that will
befit your requirements.
Reference
1. "RAND_MAX". docs.microsoft.com.
2. "Visual Studio 2005 Retired documentation". Microsoft Download
Center.
3. "PHP: microtime – Manual". php.net.
4. "PHP: rand – Manual". php.net.
5. "Archived copy". Archived from the original on 2008-10-19.
Retrieved 2008-10-17.
6. "Linux / UNIX: Generating Random Password With mkpasswd /
makepasswd / pwgen". cyberciti.biz. November 2007.
7. "StrongPasswords – Community Help Wiki". help.ubuntu.com.
Retrieved 2016-03-25.
8. NIST. Automated Password Generator standard FIPS 181
9. Shay, Richard; Kelley, Patrick Gage; Komanduri, Saranga;
Mazurek, Michelle L.; Ur, Blase; Vidas, Timothy; Bauer, Lujo;
Christin, Nicolas; Cranor, Lorrie Faith (2012). Correct horse
battery staple: Exploring the usability of system-assigned
passphrases (PDF). SOUPS '12 Proceedings of the Eighth
Symposium on Usable Privacy and Security.
doi:10.1145/2335356.2335366.
10.Ganesan, Ravi; Davies, Chris (1994). "A New Attack on Random
Pronounceable Password Generators" (PDF). Proceedings of the
17th {NIST}-{NCSC} National Computer Security Conference.
NIST: 184–197. Retrieved 2014-12-17.
11."Rate my random password generator!". Crypto.
12. "9.6. random — Generate pseudo-random numbers — Python 3.5.1
documentation". docs.python.org. Retrieved 2016-03-25.