Document
Document
__________________
(Ms. Meghali Kalyankar)
Guide
This project report by Manoj Ramashish Gupta, Yash Pratap Koli, Vedant Ashok
Patiyane and Kedar Prashant Wagh entitled PASSWORD GENERATOR AS A CHROME EXTENSION
is published for III. A semester that partially meets the requirements for a
bachelor's degree.
Guide:
Ms. Meghali Kalyankar
Examiner:
1st
________________________________________
2.__________________________
Date:
Place: Mumbai
Statement
I declare that this written submission expresses my thoughts in my own words. to
the original source. We also adhere to all principles of academic honesty and
integrity and do not misrepresent, invent, or falsify any ideas/data/facts/sources
contained in my submission. Violation of the foregoing shall be grounds for
disciplinary action by the Institute, and shall not constitute criminal conduct
from sources not properly cited or, where appropriate, without proper
authorization.
Date:
Summary There are many password generators on the Internet. However, they are not
certain and are of a general nature. Many users have trouble remembering complex
passwords and tend to use old passwords more often. This project presents a new
technique for generating random and complex passwords by selecting letters and
numbers entered by the user. Users can also choose multiple unique and complex
passwords from the combinations they enter. It generates passwords from a selection
of letters and numbers entered by the user, making them more reliable and easier to
remember. In general, we recommend using open-source security tools whenever
possible, as the quality of the methods used can be independently verified. Note
that randomly generated passwords do not guarantee secure passwords. In fact,
there is absolutely no need to generate passwords in a completely random process.
It should be hard enough to guess. There are many examples of "random" password
generators on the Internet, but generating randomness can be difficult and many
programs do not generate random characters in a way that guarantees strong
security.
In general, we recommend using open-source security tools whenever possible, as the
quality of the methods used can be independently verified. Note that just randomly
generating a password doesn't mean it's a strong password. In fact, there is
absolutely no need to generate passwords in a completely random process. Must be
hard enough to guess.
Keywords: password, management, random, complexity, security.
Table of Contents
TOC \h \u \z Abstract PAGEREF _Toc118653042 \h 1List of Figure PAGEREF
_Toc118653043 \h 3List of Tables PAGEREF _Toc118653044 \h 3List of Abbreviation and
notations: PAGEREF _Toc118653045 \h 4Chapter 1: PAGEREF _Toc118653046 \h
6Introduction PAGEREF _Toc118653047 \h 61.1 Introducing password generator PAGEREF
_Toc118653048 \h 71.2 Managing Password PAGEREF _Toc118653049 \h 81.3 Motive
PAGEREF _Toc118653050 \h 8Chapter 2: PAGEREF _Toc118653051 \h 10Problem Statement
PAGEREF _Toc118653052 \h 10Chapter 3: PAGEREF _Toc118653053 \h 12Review of
Literature PAGEREF _Toc118653054 \ h 123.1 Research Gaps and Findings PAGEREF
_Toc118653055 \h 13Chapter 4: Comparative Analysis PAGEREF _Toc118653056 \h
15Chapter 5: Implementation PAGEREF _Toc118653057 \h 205.1 Implementation PAGEREF
_Toc118653058 \h 215.1.1 Chrome Extension PAGEREF _Toc118653059 \h 215.1.2 Creating
Chrome Extension PAGEREF _Toc118653060 時 215
In step 1.3, add this project as a Chrome browser extension. PAGEREF
_Toc118653061 \h 215.1.4 Flow Chart PAGEREF _Toc118653062 \h 22Chapter 6:Design
Details PAGEREF _Toc118653063 \h 236.1 Language Used PAGEREF _Toc118653064 \h 246.2
Technology used PAGEREF _Toc118653065 \h 246.3 API File PAGEREF _Toc118653066 \h
246.4 Steps PAGEREF _Toc118653067 \h 24Chapter 7: Future Scope PageRef
_toc118653068\H 26Chapter 8: Conclusion PageRef _toc118653069\h 28Chapter 9:
References PageRef _toc118653070\h 3044 - _toc118\H\H Figure Password Generator 6
Figure 1. Two Password Manager Cyber Victim 8 Figure 3. 1 Flowchart 13
Figure 5.1 Load Unpack 20
Figure 5.2 Flowchart 21
List of Tables TOC \h \u \z Table 1
1 List of Abbreviation 3
Table 4. 1 Comparative Analysis 15
List of Abbreviation and notations:Table 1. 1 List of Abbreviations
HTTP Hypertext Transfer Protocol
HTML Hypertext markup language
CSS Cascading Style Sheets
IOT Internet Of Things
OTP One Time Password
PCFG Probabilistic Context-Free Grammars
CSSM Cloud Secure Storage Mechanism
ASR Automatic Speech Recognition
AGM Advanced Graphics Module.
BIST Built-in self-test
ICs Industrial control system
ERA Electrical Replaceable Assembly
AES Advanced Encryption Standard.
RPA Robotic Process Automation
PCFG Probabilistic Context-Free Grammars
LT-LFSR Linear Feedback Shift Register
CPM Critical path method
PUF Physical unclonable function
VRP Vehicle routing problem
SRAM Static random-access memory
FPGA Field programmable gate array
DOM Document Object Model
IoV Input/output virtualization
QR code Quick response code
OS Operating System
CSCWD Computer Supported Co- Operative Work In Design
VSCODE Visual Studio code
IP Internet Protocol
SSH Secure Shell
DOS Denial Of Service
DDOS Distributed Denial Of Service
FTP File Transfer Protocol
SNMP Simple Network Management Protocol
CPRI Common Public Ratio Interface
DNS Domain Name System
APT Advanced Persistent Threat
Chapter 1:Introduction
Chapter 1: Introduction
Introduction
Password Generator generates Random Password based on the following format
selected. If you need to create a temporary account through a website (Amazon,
Flipkart, etc.) to avoid periodic notifications and offers, you can do so using our
extension. The extension is much easier to use and allows you to create passwords
and manage passwords easily.
1.1 Introduction to Password Generator All you need to know about password
generator is the necessity of password generator.
Strong passwords are the key to protecting your personal assets on the Internet.
password generators are used to help generate highly secure passwords that are
difficult to track or hack.
Languages used are HTML, CSS and JavaScript.
Use a dynamic website
Figure 1.1 Password Generator
Figure 1.3
Cyber Victims Country Statistics Country names indicate the number of cyber
victims
Chapter 2: Problem Description Chapter 2:
Problem Description The most common form of corporate and personal data breach.
Password attacks are easy when hackers try to steal passwords. Hackers know that
many passwords are poorly designed, so password attacks remain an attack vector
when passwords are in use. Using a password manager is the safest way to ensure
your credentials are properly encrypted
This protects your password from prying eyes and unauthorized access. Other types
of password generators are designed to generate more recognizable passwords instead
of completely random character sets. There are tools that generate pronounceable
passwords and custom tools that allow users to set advanced conditions. For
example, a user may be required to generate a new password with a certain number of
characters, a certain combination of letters and numbers, a certain number of
special characters, or other criteria. Password Generator helps users who
constantly need to invent new passwords, secure access to programs, and manage
large numbers of passwords for identity and access management. Another type of tool
is a password vault, where users store many passwords in one secure location.
Chapter 7: Future Scope. With the proliferation of password managers today, the
difficulty of remembering more complex passwords is no longer a problem for most
users.
Passwords are now an integral part of security measures. This has been the case
for many years. However, passwords cause many problems. They are hard to remember
and require too much knowledge. Additionally, it may have been stolen and leaked to
the dark web. Combining these two statements creates more problems.
When I need to know a lot of hard-to-remember passwords (because simple passwords
are easy to crack with brute force), I tend to take shortcuts. You can keep track
of all your credentials by reusing passwords or relying on risky storage methods
Generation of density-based clustering rules for password guessing. Generate
mangling rules with density-based clustering for password guessing.
Many people try to create passwords that are easy to remember, or create passwords
for each account. This act is very dangerous. While it makes things easier for
users, it also makes it easier for computer hackers to guess passwords and access
and compromise data.
Chapter 8: Conclusion
Conclusion
Password Generator is an attractive, exciting and engaging application. Create
strong passwords with our secret password generator. This password generator saves
website passwords. Clear all data as soon as you exit the window. So, with this
password generator, you can create a secret strong password without any hesitation
[2]. Many authentication schemes are available to protect people's data. Most of
the time, users forget their passwords because of these complex patterns. This
project proposes a unique algorithm to generate strong passwords, unlike other
existing random password generators. Our proposed system generates passwords by
prompting users to provide (easy-to-remember) text and numbers as input. Generated
password meets minimum password strength standards
We have experimented that generated passwords can defeat dictionary and brute force
attacks. [3] In this paper, we simulate a game between attackers and defenders to
evaluate possible strategies in the honeyword system. The attacker's guessing
strategy uses top PW attacks and proposes a new PassGAN-based attack. The proposed
defender spawning strategy could lower the attacker's success rate to her 9%.
Chapter 9: References
Reference Y. Yin, J. Jang-Jaccard und N. Baghaei, 「PassImg: A Secure Password
Generation and Management Scheme without Storeing」, 2022 IEEE 25th International
Conference on Computer Supported Cooperative Work in Design (CSCWD), 2022, S. 341-
346,ドイ: 10.1109/CSCWD54268.2022.9776045.
https://ieeexplore.ieee.org/document/9776045S
Li, Z. Wang, R. Zhang, C. Wu and H. Luo, "Generating Mangling Rules with Density-
Based Clustering for Password Guessing," IEEE Transactions on Trusted and Secure
Computing, 2022, doi : 10.1109/TDSC.2022.3217002 .
https://ieeexplore.ieee.org/document/9928405
He X, Cheng H, Xie J, Wang P, and K