Vidyavardhini Charitable Trust Abhaysinhraje Bhonsle Institute of Technology Shahunagar Shendre, Satara
Vidyavardhini Charitable Trust Abhaysinhraje Bhonsle Institute of Technology Shahunagar Shendre, Satara
A Report On
“MICRO PROJECT”
MSBTE, PUNE
Page 1 of 12
Computer Engineering
CERTIFICATE
This is to certify that:
Sr no Name Enrollment No
1 Dhanawade Tanmay Vinod 2109830112
Page 2 of 12
Computer Engineering
TABLE OF CONTENTS
2. Action plan 5
3. Introduction 6
5. Skills/Outcomes 8
7. Program Code 9
8. Output 10
9. Conclusion 11
10. Reference 12
Page 3 of 12
Computer Engineering
ABSTRACT
Page 4 of 12
Computer Engineering
ACTION PLAN
Page 5 of 12
Computer Engineering
INTRODUCTION
Long: The longer a password, the more secure it is. A strong password should be at
least 12 characters long.
Page 6 of 12
Computer Engineering
• Are integrated into a password manager like Dashlane to create, manage, and
easily use all of your strong passwords
Page 7 of 12
Computer Engineering
Page 8 of 12
Program Code:-
import
java.util.Random;
import
java.util.Scanner;
9
Public static void main(String[] args){
Scanner sc = new Scanner(System.in);
System.out.print(“Enter the size of password: “);
Int size = sc.nextInt();
Sc.close();
Output:
Enter the size of password: 8
I”~|trj%
10
Conclusion
When it comes to password generation, storage, and recall, there are a variety
of approaches. Even randomly weak passwords are likely to be immune to
online and offline assaults, therefore choosing passwords of adequate length is
still desirable. According to our study, the length of resistance to online
assaults is 10 and the length of resilience to offline attacks is 18. When it comes
to storing local databases and information, AES-256 is the industry standard.
For recalling data security and accessibility are provided by OS-based mobile
autofill frameworks, and all frameworks need user engagement prior to
autofill. Furthermore, iOS password autofill encrypts the autofill process for
native UI components in apps completely. Localstorage with master password
encryption is considered the best approach in web extensions.
11
References
1. https://www.avast.com/en-in/random-password-generator
2. https://www.researchgate.net/publication/305388934_Password_Gener
ators
3. https://www.techopedia.com/definition/31414
4. https://www.sciencedirect.com/topics/computer-science/generated-
password 5.https://passwords-generator.org
12