0% found this document useful (0 votes)
27 views

OS_Report

Uploaded by

shreeyaasenthil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
27 views

OS_Report

Uploaded by

shreeyaasenthil
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 25

PASSWORD MANAGER

A PROJECT REPORT
Submitted by

SHREEYAA SENTHILNATHAN (RA2211008020096)

In partial fulfillment for the award of the degree


of
BACHELOR OF TECHNOLOGY
in

INFORMATION TECHNOLOGY

SRM INSTITUTE OF SCIENCE AND TECHNOLOGY,


RAMAPURAM: CHENNAI 600089
NOVEMBER 2023

1
SRM INSTITUTE OF SCIENCE AND TECHNOLOGY,
RAMAPURAM

BONAFIDE CERTIFICATE

Certified that this project report “PASSWORD MANAGER” is the bonafide

work of SHREEYAA SENTHILNATHAN (RA2211008020096) who carried

out the 21CSC202J OPERATING SYSTEMS project work under my

supervision.

SIGNATURE SIGNATURE
Mrs. B. SATHYA BAMA Dr. RAJESWARI MUKESH
Assistant Professor HEAD OF THE DEPARTMENT
Dept. of Information Technology Dept. of Information Technology
SRM Institute of Science &Technology SRM Institute of Science & Technology
Ramapuram, Chennai – 600089 Ramapuram, Chennai - 600089

SUBMISSION OF 21CSC202J OPERATING SYSTEMS PROJECT REPORT


FOR PYTHON VIVA-VOICE HELD ON ____________________

2
ACKNOWLEDGEMENT

To the grace and generous blessing of God Almighty, I attribute the


successful completion of the 21CSC202J OPERATING SYSTEMS. It is my
duty to respectfully offer our sincere gratitude to all the people who have kindly
offer their valuable support, guidance. I would like to extend my heartiest
thanks to the Management of our college, who provided me with necessities
for the completion of the seminar.

I would like to express my deep gratitude to Dr. K.V. NARAYANAN,


our Associate Director, who has been a source of motivation to all the staffs
and students of our college. I feel highly privileged in making a mention of Dr.
M. MURALI KRISHNA (DEAN, E&T) for his co-operation and help.

I deeply and wholeheartedly thank Dr. RAJESWARI MUKESH


(HOD, IT) for her extreme valuable advice and encouragement. I thank my
project coordinator MRS. B. SATHYA BAMA for his consistent guidance and
mentoring throughout the project phase. Last but not the least, we thank all
others and especially our classmates who in some-way or other helped us in
successful completion of this work.

3
TABLE OF CONTENTS

CHAPTER NO TITLE PAGE


NO
ABSTRACT 5
1. INTRODUCTION 6

2. PROBLEM STATEMENT 7

3. SYSTEM REQUIREMENTS 11

4. SYSTEM MODULES 12

5. SYSTEM IMPLEMENTATION 14

6. CONCLUSION 18

APPENDIX 1 (Sample Coding) 19


A APPENDIX 2 (Sample Screenshot) 20

REFERENCES 24

4
ABSTRACT

Developing a robust Password Manager to enhance digital security. This

project aims to create a user-friendly application that securely stores and

manages passwords for various online accounts. Employing advanced

encryption algorithms, the Password Manager ensures the confidentiality of

sensitive information. The intuitive interface allows users to easily organize

and retrieve passwords, promoting efficient and secure access to their accounts.

With features like password generation and automatic form filling, the manager

streamlines the user experience. By addressing the increasing threats of cyber-

attacks, this project contributes to a safer online environment, emphasizing the

importance of proactive digital security practices.

5
CHAPTER 1
INTRODUCTION

In an age where digital landscapes are constantly evolving, the need for robust
cybersecurity measures has become paramount. Our project, the Password Manager,
emerges as a comprehensive solution to address the escalating challenges of online security.
With an increasing reliance on numerous digital platforms, the vulnerability of personal
information to cyber threats is at an all-time high. The Password Manager serves as a
proactive shield, offering a sophisticated and user-friendly approach to fortify digital
defenses and protect sensitive credentials.

This project revolves around the creation of a cutting-edge Password Manager that
goes beyond the conventional paradigm. Our focus is not only on securely storing passwords
but also on implementing advanced encryption techniques to safeguard the integrity of user
information. The intuitive interface ensures ease of use without compromising the robust
security protocols in place.

As cyber threats continue to evolve, our Password Manager adapts with state-of-the-
art encryption algorithms, staying ahead of potential risks. Users can efficiently organize and
retrieve passwords for diverse online accounts, supported by features such as a password
generator that enhances security by creating complex and unique passwords. The automatic
form-filling capability further streamlines the user experience, promoting secure and
convenient access to digital accounts.

This project is not just about managing passwords; it's about empowering users with
a proactive defense mechanism against phishing, identity theft, and other online
vulnerabilities. As we embark on this journey, our goal is to contribute significantly to
individual and collective cybersecurity, creating a safer and more resilient digital
environment for all.

6
CHAPTER 2
PROBLEM STATEMENT

A Password Manager serves as a vital tool in the realm of digital security, aiming to
address several key features to enhance user safety and convenience. This is explained in the
problem statement.

1. Password Generation and Complexity:


 One primary objective of a password manager is to assist users in generating strong,
complex, and unique passwords for their various online accounts. These passwords are
typically a combination of letters (both uppercase and lowercase), numbers, and special
characters, ensuring they are resilient to brute-force attacks.
 Moreover, the password manager can automatically update passwords at regular
intervals, further bolstering security by preventing the prolonged use of the same credentials.

2. Secure Storage and Encryption:


 A password manager securely stores login credentials in an encrypted vault. This
encryption ensures that even if the vault were to be compromised, the stored passwords
would be unintelligible to unauthorized parties.
 Additionally, some advanced password managers offer multi-factor authentication
for an extra layer of security, requiring an additional verification step (e.g., a fingerprint scan
or authentication code) before granting access to stored passwords.

3. Convenience and Autofill:


 One of the primary objectives is to streamline the login process for users. A password
manager can automatically fill in login credentials when a user visits a website or app, saving
time and eliminating the need to remember or manually enter complex passwords.
 This convenience is particularly valuable in today's interconnected digital landscape,
where users have numerous accounts across various platforms.

4. Cross-Platform Synchronization:
 Password managers often operate on a cross-platform basis, ensuring that stored
passwords are accessible across different devices and operating systems. This

7
synchronization enables users to maintain a consistent and secure login experience
regardless of the device they are using.
 By syncing passwords across devices, users can seamlessly transition between
desktops, laptops, smartphones, and tablets without compromising security.

5. Password Auditing and Security Recommendations:


 Many password managers provide tools to assess the strength and security of existing
passwords. They can identify weak or reused passwords and prompt users to update them
with stronger alternatives.
 Additionally, password managers may offer security recommendations, such as
suggesting changes for passwords that have been in use for an extended period or flagging
passwords that have been compromised in data breaches.

6. Secure Password Sharing:


 Some advanced password managers offer secure sharing features, allowing users to
grant trusted individuals access to specific accounts or credentials without revealing the
actual passwords.
 This capability is especially useful for teams or families who need to collaborate on
shared accounts while maintaining security and control over sensitive information.

7. Emergency Access and Digital Inheritance:


 Certain password managers provide mechanisms for users to designate trusted
contacts who can gain access to their passwords in case of an emergency or in the event of
their incapacitation or passing. This feature ensures that critical accounts can be managed by
designated individuals if necessary.
 This concept of digital inheritance is becoming increasingly important in the modern
digital age.

8. Integration with Biometric Authentication:


 Some password managers integrate with biometric authentication methods like
fingerprint or facial recognition. This provides an additional layer of security and
convenience for users, allowing them to access their passwords using their unique biometric
data.

8
9. Secure Notes and Personal Information Storage:
 In addition to passwords, many password managers offer the capability to securely
store sensitive information such as credit card details, personal identification numbers (PINs),
and other confidential notes. This feature ensures that users can keep track of essential
information in a secure manner.

10. Password History and Versioning:


 Password managers often keep a history of passwords, allowing users to revert to
previous versions. This is especially useful in situations where a password change has led to
access issues, providing an easy way to restore functionality.

11. Password Expiry Reminders:


 Some password managers include features that remind users to update passwords
that have been in use for an extended period. This helps enforce good security practices and
reduce the risk of using outdated or compromised credentials.

12. Encrypted File Storage:


 Advanced password managers may offer the capability to securely store files, such
as sensitive documents or images, within the encrypted vault. This expands the utility of the
password manager beyond just password management.

13. Two-Factor Authentication Code Management:


 Certain password managers can store and autofill two-factor authentication (2FA)
codes, providing a centralized location for managing this additional layer of security.

14. Password Import and Export:


 Users may need to migrate passwords between different password managers or
export them for backup purposes. Password managers often include features for importing
and exporting password data in various formats.

15. Password Policy Enforcement:

9
 In organizational settings, password managers may include features for enforcing
password policies, ensuring that employees adhere to specific security standards when
creating and managing their passwords.

16. Account Lockout Protection:


 To guard against brute-force attacks, some password managers incorporate
mechanisms to temporarily lock an account after a certain number of unsuccessful login
attempts, adding an extra layer of security.

17. Dark Web Monitoring:


 Advanced password managers may offer features that monitor the dark web for
breaches and compromised credentials associated with a user's email address, providing
timely alerts and recommendations for password changes.

18. Password Strength Meter:


 Password managers often include a password strength meter that evaluates the
complexity of chosen passwords in real-time, providing immediate feedback to users and
encouraging the creation of robust credentials.

10
CHAPTER 3

SYSTEM REQUIREMENTS

3.1 SOFTWARE REQUIREMENTS:

1. Python
2. Integrated Development Environment (IDE):
 PyCharm
 Visual Studio Code
3. Dependencies and Libraries:
 Cryptography
 SQLite
 Tkinter.
4. Database Management System (DBMS):
 MySQL
5. Documentation Tools:
 Sphinx

3.2 HARDWARE REQUIREMENTS:

1. Computer
2. Processor (CPU)
3. Memory (RAM)
4. Storage
5. Network
6. Graphics

11
CHAPTER 4

SYSTEM MODULES

1. User Authentication Module:

- Responsible for user registration and authentication.

- Manages user credentials securely.

- Implements multi-factor authentication for enhanced security.

2. Password Storage Module:

- Stores and organizes user passwords in a secure manner.

- Utilizes encryption algorithms to protect stored passwords.

- Allows users to categorize passwords for different accounts.

3. Password Generation Module:

- Generates strong and unique passwords for users.

- Provides customization options for password complexity.

- Ensures adherence to best practices for password strength.

4. User Interface (UI) Module:

- Develops an intuitive and user-friendly interface.

- Enables easy navigation and interaction for users.

- Includes features like search, sorting, and filtering for efficient password management.

5. Encryption and Security Module:

- Implements advanced encryption techniques to secure sensitive data.

- Monitors and logs security-related events for auditing.

- Regularly updates encryption protocols to address emerging threats.

12
6. Password Update and Expiry Module:

- Notifies users of password expiry and prompts them to update passwords.

- Manages password change processes securely.

- Enforces password policies to enhance security.

7. Backup and Recovery Module:

- Allows users to create secure backups of their password data.

- Implements a robust recovery mechanism in case of data loss or system failure.

- Ensures the integrity of backup files.

8. Cross-Platform Compatibility Module:

- Ensures the Password Manager is compatible with various devices and platforms.

- Enables synchronization of password data across different devices securely.

9. Audit and Logging Module:

- Records user activities and system events for auditing purposes.

- Facilitates the review of security logs to identify potential security issues.

- Supports compliance with security standards and regulations.

10. Integration Module:

- Integrates with web browsers and other applications for seamless password autofill.

- Collaborates with operating systems and security tools for enhanced compatibility.

13
CHAPTER 5
SYSTEM IMPLEMENTATION

6.1 ALGORITHM:

1. Password Storage:
 Instead of having a hardcoded password in your code, consider using a more secure method,
such as storing hashed passwords and comparing the hashed versions. This adds an extra layer
of security.

2. Code Structure:
 Consider organizing your code into functions or classes for better readability and
maintainability. This can make it easier to understand and modify your code in the future.

3. Password Strength Checker:


 The logic for checking password strength is present, but the last condition in the
`GetPassStrength` function seems incomplete. Make sure to add the appropriate logic for
evaluating strong passwords.

4. Security Measures:
 In a real-world application, you'd want to implement more robust security measures, such as
session management, secure password hashing, and potentially using a database to store user
credentials securely.

6.2 PROGRAM CODE:

#basic streamlit app implement login and logout


import streamlit as st
import pandas as pd
import numpy as np
import time

14
import os
import random
import string
import re
from password_strength import PasswordStats
import hashlib
st.set_page_config(page_title="password manager", page_icon=":smiley:",
layout="centered", initial_sidebar_state="expanded")

login_status = False

def checkpass(username, password):


if username == "admin" and password == "admin": #password ==
hashlib.md5(password.encode()).digest ==
b'\xda\x06{\x0cz\x0b6\xff\xb2s\x1c\x1b\xd9\xe4\xa1\xbd':
return True
else:
return False

def GetPassStrength(password):

weak = 'weak'
med = 'medium'
strong = 'strong'

if len(password) >12:
st.success('password is greater than 12 characters which is enchancing your security')

elif len(password) <6:


st.warning('password is too short It must be minimum 6 characters')

elif len(password) >=6:


if password.lower()== password or password.upper()==password or
15
password.isalnum()==password:
st.write('password is', weak)
elif password.lower()== password and password.upper()==password or
password.isalnum()==password:
st.write('password is', med)
else:
password.lower()== password and password.upper()==password and
password.isalnum()==password
st.write('password is', strong)

if login_status == False:
st.title("Password Manager")
st.header("Login")
st.subheader("Enter your credentials")
username = st.text_input("Username")
password = st.text_input("Password", type='password')
if checkpass(username, password):
login_status = True
st.success("Logged in as {}".format(username))
else:
st.warning("Wrong username/password")

if login_status == True:
menu_option = st.sidebar.selectbox("Menu", ["Password Generator", "Password Quality
Checker", "Password Manager"])

if menu_option == "Password Generator":


st.subheader("Password Generator")
st.write("This is the password generator")
# generate password with lenght as user input using all pritable characters
passlen = st.slider("Password Length", 5, 25, 10)
password = ''.join(random.choices(string.printable, k=passlen))
st.write("Your password is: ", password)

16
elif menu_option == "Password Quality Checker":
st.subheader("Password Quality Checker")
st.write("This is the password quality checker")
# check password quality use complex methods
password = st.text_input("Enter your password", type='password')
GetPassStrength(password)

17
CHAPTER 6

CONCLUSION

In conclusion, the Password Manager project establishes a crucial foundation for robust
digital security. By combining advanced encryption, user-friendly interfaces, and proactive
features like a Password Generator, it enhances the protection of sensitive information. This
project not only addresses current challenges in password management but also promotes a
culture of cybersecurity awareness. As users increasingly rely on digital platforms, the
Password Manager emerges as a vital tool, ensuring a safer and more resilient online
experience.

18
APPENDIX 1
SAMPLE CODING

19
APPENDIX 2 SAMPLE OUTPUT

20
21
22
REFERENCES:

 https://medium.com/@bikumandlasatwik/using-python-to-build-a-password-manager-
66fcf1829081

 https://python.plainenglish.io/building-a-python-password-manager-a-hands-on-project-for-
beginners-a12ed1023d8e
23
24
25

You might also like

pFad - Phonifier reborn

Pfad - The Proxy pFad of © 2024 Garber Painting. All rights reserved.

Note: This service is not intended for secure transactions such as banking, social media, email, or purchasing. Use at your own risk. We assume no liability whatsoever for broken pages.


Alternative Proxies:

Alternative Proxy

pFad Proxy

pFad v3 Proxy

pFad v4 Proxy