0% found this document useful (0 votes)
32 views12 pages

Vidyavardhini Charitable Trust Abhaysinhraje Bhonsle Institute of Technology Shahunagar Shendre, Satara

Uploaded by

rajvardhan0266
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
32 views12 pages

Vidyavardhini Charitable Trust Abhaysinhraje Bhonsle Institute of Technology Shahunagar Shendre, Satara

Uploaded by

rajvardhan0266
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 12

Computer Engineering

A Report On
“MICRO PROJECT”

“Password Generating System"

Submitted from the

“DIPLOMA IN INFORMATION TECHNOLOGY”

MSBTE, PUNE

Department of Information Technology


Abhaysinhraje Bhonsle Institute of Technology
(Polytechnic), Shendre, Satara.

Academic Year – 2023-24


Vidyavardhini Charitable trust
Abhaysinhraje Bhonsle Institute of Technology
Shahunagar -Shendre, Satara.

Page 1 of 12
Computer Engineering

CERTIFICATE
This is to certify that:

Sr no Name Enrollment No
1 Dhanawade Tanmay Vinod 2109830112

2 Talekar Sanket Shivaji 2109830150

3 Yadav Pranav Rajendra 2109830153

Diploma in Information Technology has satisfactorily completed the


project work under micro project report on , “Password Generating
System” under my guidance and supervision, this is part of partial
fulfillment of the requirement for submission of Maharashtra State Board
of Technical Education , Mumbai during semester third of Academic year
2023-24…

GUIDE H.O.D. PRINCIPAL

(Mr.Kale.K.S) (Mr.Kazi.A.D) (Mr. Dhumal.S.U)

Page 2 of 12
Computer Engineering

TABLE OF CONTENTS

Sr. Index Page No.


No.
1. Abstract 4

2. Action plan 5

3. Introduction 6

4. Actual Resources Used 7

5. Skills/Outcomes 8

6. Commonly used constructors 8

7. Program Code 9

8. Output 10

9. Conclusion 11

10. Reference 12

Page 3 of 12
Computer Engineering

ABSTRACT

The Automated Password Generator Standard specifies an algorithm to generate


passwords for the protection of computer resources. This standard is for use in
conjunction with FIPS PUB 112, Password Usage Standard, which provides basic
security criteria for the design, implementation, and use of passwords. The
algorithm uses random numbers to select the characters that form the random
pronounceable passwords. The random numbers are generated by a random
number subroutine based on the Electronic Codebook mode of the Data Encryption
Standard (DES) (FIPS PUB 46-1).
The generate site-specific passwords on demand. Such systems are an al-
ternative to password managers. Over the last 15 years a range of
password generator systems have been described. This paper proposes the
first general model for such systems, and critically examines op-
tions for instantiating this model; options considered include all those
previously proposed as part of existing schemes as well as certain novel
possibilities. The model enables a more objective and high-level assess-
ment of the design of such systems; it has also been used to sketch a
possible new scheme, AutoPass, intended to incorporate the best fea-
tures of the prior art whilst also addressing many of the most serious
shortcomings of existing systems through the inclusion of novel fea-
tures.

Page 4 of 12
Computer Engineering

ACTION PLAN

Sr. Details of Activity Start Finish Responsible


No. Date Date Team Member

1. Selected the topic for Micro 26/7/23 2/8/23 Sanket


project
2. Organized things required 2/8/23 9/8/23 Pranav
for Micro project
3. Browsed for information of 9/8/23 16/8/23 Tanmay
raw data
4. Attended extra lecture for 16/8/23 23/8/23 Sanket
project Pranav
Tanmay
5. Prepared notes accordingly 23/8/23 30/8/23 Pranav

6. Created Word document 30/8/23 20/9/23 Tanmay


with our teacher’s help
7. Made required corrections 20/9/23 27/9/23 Shruthi
after discussion
8. Also created a PDF 27/9/23 4/10/23 Tanmay
document to make a hard Sanket
copy of the report Pranav

Page 5 of 12
Computer Engineering

INTRODUCTION

A password generator is a tool that automatically generates a password based on


guidelines that you set to create strong and unpredictable passwords for each of
your accounts.
Password generators help those who have to constantly come up with new passwords
to ensure authorized access for programs and to manage a large number of passwords
for identity and access management. Other kinds of tools include a password vault,
where users manage large numbers of passwords in a secure location.
Other types of password generators are made to generate more recognizable
passwords rather than a completely random set of characters. There are tools for
generating pronounceable passwords, as well as custom tools that allow users to set
detailed criteria. For instance, a user could set a request for a certain number of
characters, a certain mix of letters and numbers, a certain number of special
characters, or any other criteria for generating a new password.Some password
generators are simply random password generators. These programs produce
complex/strong passwords with combinations of numbers, uppercase and
lowercase letters, and special characters such as braces, asterisks, slashes, etc

What's a strong password?

Long: The longer a password, the more secure it is. A strong password should be at
least 12 characters long.

Random: Strong passwords use a combination of letters, numbers, cases, and


symbols to form an unpredictable string of characters that doesn't resemble words
or names.

Unique: A strong password should be unique to each account to reduce


vulnerability in the event of a hack

Page 6 of 12
Computer Engineering

Good password generators do the following:

• Adjust guidelines to fit different sites' unique password requirements

• Generate strong passwords using secure technology with built-in


randomness

• Are integrated into a password manager like Dashlane to create, manage, and
easily use all of your strong passwords

• Actual Resources Used

Sr No. Name of Specification Qty Remarks


resources
1 Operating Windows 10 1 -
system
2 Computer Intel @ core 1 -
(TM)i5-6500
GHz, 4GM
RAM
3 Software Eclipse IDE 1 -

Page 7 of 12
Computer Engineering

Skills Developed / Learning Outcomes

1. Able to prepare code.

2. Able to face errors, defects and faults.

The objects of a JPasswordField class is a text component specialized

for password entry. it allows the editing of a single line of text. It

inherits JTextField class.

Commonly used Constructors:


Commonly used Constructors:
Constructor Description
JPasswordField() Constructs a new IPasswordField, with
a default document, null starting text
string, and 0 column width.
PasswordField(int columns) Constructs new empty PasswordField
with the specified number of columas.
JPasswordField(String text) Constructs a new JPasswordField
initialized with the specified text.
JPasswordField( String text, int Construct a new JPasswordField
columns) inrialized with the specified text and
columns.

Page 8 of 12
Program Code:-
import
java.util.Random;
import
java.util.Scanner;

Public class generator {


// function to generate password
Static String generate_password(int size) {
// collection of characters that can be used in password
String chars =
abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQR
STU
VWXYZ1234567890!@#$%^&*()_+-/.,<>?;’:\[]{}\\|`~”;

String password = “”;


// creating object of Random class
Random rnd = new Random();
// looping to generate password
While (password.length() < size) {
// get a random number between 0 and length of chars
Int index = (int) (rnd.nextFloat() * chars.length());
// add character at index to password
Password += chars.charAt(index);
}
Return password;
}

9
Public static void main(String[] args){
Scanner sc = new Scanner(System.in);
System.out.print(“Enter the size of password: “);
Int size = sc.nextInt();
Sc.close();

// calling function to generate password


String password = generate_password(size);
// printing the password
System.out.println(password);
}
}

Output:
Enter the size of password: 8
I”~|trj%

Enter the size of password: 12


Og%AKGy%KS)z

10
Conclusion
When it comes to password generation, storage, and recall, there are a variety
of approaches. Even randomly weak passwords are likely to be immune to
online and offline assaults, therefore choosing passwords of adequate length is
still desirable. According to our study, the length of resistance to online
assaults is 10 and the length of resilience to offline attacks is 18. When it comes
to storing local databases and information, AES-256 is the industry standard.
For recalling data security and accessibility are provided by OS-based mobile
autofill frameworks, and all frameworks need user engagement prior to
autofill. Furthermore, iOS password autofill encrypts the autofill process for
native UI components in apps completely. Localstorage with master password
encryption is considered the best approach in web extensions.

11
References

1. https://www.avast.com/en-in/random-password-generator
2. https://www.researchgate.net/publication/305388934_Password_Gener
ators
3. https://www.techopedia.com/definition/31414
4. https://www.sciencedirect.com/topics/computer-science/generated-
password 5.https://passwords-generator.org

12

You might also like