0% found this document useful (0 votes)
33 views5 pages

Synopsis

Uploaded by

kapilvihang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
33 views5 pages

Synopsis

Uploaded by

kapilvihang
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as DOCX, PDF, TXT or read online on Scribd
You are on page 1/ 5

MIT ADT University, Pune

MIT School of Computing


Department of Computer Science and Engineering

Project Synopsis

Group ID:
Project Title: ________Personal Password Management System
__________________________________________________
Group Members:

Enrollment Roll No. Name of Email Id Contact


Number student Number

ADT23SOCB02 9 Asta Joseph astajoseph1@g 9152654767


31 mail.com

ADT23SOCB04 23 Harshal Pawar pawarharshal06 70665 93072


22 [email protected]

ADT23SOCB04 24 Hephzibah hephzibahkolge 99211 70824


34 Kolge @gmail.com

ADT23SOCB05 35 Mayur Pagote mayuredu1105 93560 63818


97 @gmail.com
Problem Statement:

Storing passwords directly in a browser may seem convenient, but it poses


significant security risks. Anyone with access to the same computer can view or use
these saved passwords without the primary user’s permission, potentially leading to
data theft or unauthorized access to sensitive accounts. To address this vulnerability,
a personal password manager can be developed. Unlike basic browser storage, a
dedicated password manager securely encrypts passwords, protecting them from
unauthorized access. This approach not only improves data security but also allows
users to manage and retrieve their passwords safely across various platforms.

Abstract:

The project aims to develop a secure personal password manager using


Python to address the security risk of storing passwords in browsers,
which can be accessed by unauthorized users. This password manager
will store credentials such as usernames, site names, and passwords
securely by encrypting them in binary format. The system will include a
graphical user interface (GUI) to ensure ease of use and accessibility for
users. The goal is to provide a simple yet secure solution for managing
and organizing passwords, helping users protect their sensitive
information from unauthorized access.
Literature Survey:

As people rely on more online accounts, managing passwords has


become harder and riskier. To solve this, password managers were
created to securely store all passwords in one place. However, research
shows there are still issues. Bonneau and others (2012) found that while
password managers use strong encryption to keep passwords safe, they
can still be risky if someone cracks the main “master password.” Gasti and
Rasmussen (2012) discuss the added risks of cloud-based password
managers, which are stored online and could be hacked during
transmission. This means that even though encryption is strong, choosing
a weak master password can put all your information at risk.

Another problem with password managers is that they can be hard to use,
which stops some people from adopting them. Silver et al. (2014) found
that people may abandon password managers if they’re complicated, so
simple designs are important. Chiasson and others (2015) also looked at
this balance between security and ease of use. They found that while
strong security is crucial, a difficult interface can make users avoid using
the tool properly. Wagner et al. (2018) explored how password managers
interact with web browsers and discovered vulnerabilities that could lead
to security gaps. This shows that to make password managers truly
effective, they need to be both secure and easy to use.

To solve these issues, researchers are exploring new approaches. Zhao


et al. (2017) propose using blockchain technology for password
managers, which would store passwords in a way that’s harder to hack.
Almuhimedi et al. (2019) recommend encrypting passwords in a way that
keeps them safe even when switching between devices. Buchanan et al.
(2020) also suggest that password managers on shared computers should
have stricter access controls. Together, these studies highlight that for
password managers to work well for everyone, they need to be secure,
easy to use, and adaptable to new security threats.
Proposed System (Block Diagram):

Conclusion:

This project successfully addresses the need for a secure and user-friendly
solution for managing passwords by developing a personal password manager
using Python. By implementing encryption for password storage and providing a
graphical user interface, the system ensures both security and ease of use. This
solution mitigates the risk of unauthorized access to stored passwords, making it
a practical tool for users who want to protect their credentials from data theft or
misuse. The project demonstrates the feasibility of building a reliable password
management system with minimal resources, offering enhanced security features
beyond standard browser-based password storage.

References:
1] F. Jia and L. Z. Kong, “Intrusion Detection Algorithm Based on Convolutional Neural
Network,” "Beijing Ligong Daxue Xuebao/Transaction Beijing Inst. Technol., vol. 37, no.
12, pp. 1271–1275, 2017, doi: 10.15918/j.tbit1001-0645.2017".12.011.
[2] L. Mohammadpour, T. C. Ling, C. S. Liew, and C. Y. Chong, “A Convolutional
Neural Network for Network Intrusion Detection System,” "Proc. Asia-Pacific Adv. Netw.,
vol. 46, no. 0, pp. 50–55", 2018.
[3] U. Gur Çekmez et al., “Derin Ö˘ grenme ile A˘ g Anomali Tespiti Network Anomaly
Detection with Deep Learning Ozgur Koray Sahingoz,” 2018, pp. 1–4.
[4] A. Chawla, B. Lee, S. Fallon, and P. Jacob, “Host Based Intrusion Detection System
with Combined CNN/RNN Model,” "Lect. Notes Comput. Sci. (including Subser. Lect.
Notes Artif. Intell. Lect. Notes Bioinformatics), vol. 11329 LNAI", pp. 149–158, 2019.
[5] S. Naseer and Y. Saleem, “Enhanced network intrusion detection using deep
convolutional neural networks,” "KSII Trans. Internet Inf. Syst., vol. 12, no. 10, pp. 5159–
5178, 2018, doi: 10.3837/tiis.2018".10.028.

Annexure:
Annexure I: Form A-Title Approval (for offline mode)
Annexure II: Form B-Market and financial feasibility (verify from guide)
Annexure III: Literature survey paper or links

You might also like