You are on page 1of 1

RANDOM PASSWORD GENERATOR FOR SAFEGUARDING THE DATA ASSETS

Department of Computer Science & Engineering


School of Computing
1156CS601 – MINOR PROJECT
WINTER SEMESTER 21-22
ABSTRACT INTRODUCTION RESULTS STANDARDS AND POLICIES
A password generator is a tool that • The common practice of assigning the same local administrator name and password Password generators that generate site-specific passwords on demand are an • Anaconda prompt is a type of command line interface which explicitly deals
automatically generates strong and secure to every workstation in a domain is the largest security hole any company can have. alternative to password managers. Over the last 15 years a range of such with the ML modules and navigator is available in all the Windows,Linux and
passwords. With its help, you don’t need to If someone decrypts this common account’s password , they would have full systems have been described. We propose the first general model for such MacOS. The anaconda prompt has many number of IDE’s which make the
come up with your own passwords ever administrator access to all other machines in the organization with that same systems, and critically examine options for instantiating it. The model enables coding easier. The UI can also be implemented in python. Standard Used:
again. A single mouse click will generate account. To solve the “common administrator account configuration problem”, we an objective assessment of the design of such systems; it has also been used ISO/IEC 27001.
you a sequence of random symbols. Copy created the optional Random Password Generator Module for User Manager Pro. to sketch a possible new scheme, Auto Pass, intended to incorporate the best Jupyter
and use it as a password for your device, e • With this addon component, a domain administrator can periodically randomize all features of the prior art while addressing many of the shortcomings of existing • It’s like anaconda Prompt : An open source web application that allows us
mail, social media account, or anything else local administrator passwords on even the largest domain in just a few minutes. The systems. 12 SBIT-CSE-KMM It is a tool that generates passwords based on to share and create the documents which contains the live code, equations,
that requires restricted access. Also, don’t new passwords can be automatically stored in secure database within the program the given guidelines that you set to create an unpredictable strong password visualizations and narrative text. It can be used for data cleaning and
use the same password for more than one for later review if necessary. When randomization has been completed, cracking the for your accounts. The Password generator tool creates a random and transformation, numerical simulation, statistical modeling, data visualization,
account. Each time you need to sign up, local password on any single machine does not provide any clue as to what customized password for users that helps them to create a strong password machine learning. Standard Used: ISO/IEC 27001
create a new password using this free credentials will work on other machines. which provides greater security.
password generator. In this way, your data • If the administrator fails to change the passwords frequently enough, or uses
will be safer than ever before having a weak passwords for the common account that are too simple, then it would be possible to
password is not good for system which successfully crack the password and gain unauthorized access. Fig 1: Output `1
demands high confidentiality and security of .
user credentials. It turns out that people find
it difficult making up a strong password
which is strong enough to prevent
unauthorized users from memorizing it.
METHODOLOGIES
• The Decentralized Application is created to make the Passwords Secures and to Figure 1. Generating Password. Figure 2. Generating and Copying password.
make the protected data accessible to only authorized users and transparent and
decentralized .Tkinter is used to implement the front-end and its also used for GUI
(Graphical User Interface) and pyperclip is used to copy and paste the password
from and to clipboard. CONCLUSIONS
• Here the user provides the credentials to get to know who is registered as
authorized user. The users can be anyone like the student , or anyone but it should Complex password composition policies and that require password must be changed
be authorized user. after a period of time happens to be major obstacle for users. The proposed technique
The first GUI contains fields like shown below can assist system administrators in creating secure and memorable passwords for the
• Mail ID users with desired complex password composition policies. The generated password
TEAM MEMBER DETAILS • Password along with helping information will be sent to users.. The proposed technique causes
• The Generation of a password has several stages involved. The algorithm is more confidendiality because in this technique, distinct passwords are given to users
on different applications. If an application is compromised then rest of all are
<15208/P.NAVEEN KUMAR> designed in such a way that there is no need for any user to select the password
type. Just should select the length of the password to be generated and the level of protected.
<13561/M.DEEPIKA> ACKNOWLEDGEMENT
the password like the GUI shows Low , Medium , and strong.
<15210/T.SREEHARSHA REDDY>  The following are the steps involved:
< Phone no:7659016858> Checking the length: Once the user enters the length of the password to be generated 1. Dr.A.ILAVENDHAN/M.Tech., Ph.D.,
< Phone no:6305591799> and the level of the password like the GUI shows Low , Medium , and strong the
Random Password Generator will generate the password. Once the request is 2. 9790176965
< Phone no:8688549870> approved the password is generated the user can use the password.
<vtu15208@veltech.edu.in> Fig 2: Output 2
3. ailavendhan@veltech.edu.in
< vtu13561@veltech.edu.in >
< vtu15210@veltech.edu.in >

You might also like