Implementation of Secure Password Manager
DOI:
https://doi.org/10.48001/joitc.2023.115-8Keywords:
AES (Advanced Encryption Standard), Cryptography, Decryption, Encryption, File vault, Password manager, Safety, SecurityAbstract
In everyday life, we have many files which we want to safeguard against prying eyes. For that, this paper introduces a vault encrypted with AES to save those important files. Also, with growing internet usage, and usernames and passwords required everywhere, there is a need for a safe vault to store can if the person can forget. A desktop application for this purpose is discussed in this paper. This is a 2-part project, consisting of a secure file value and a secure password manager. The password manager uses a database. The whole of the project is developed in Python, using its various libraries that serve its purposes. Cryptography is another highlight here. But, by only using Python libraries and the functions included in them, this is possible. Extensive coding for only cryptography is not done, it is done using various functions.
Downloads
References
Bharathi, P., Annam, G., Kandi, J. B., Duggana, V. K., & Anjali, T. (2021, July). Secure file storage using hybrid cryptography. In 2021 6th International Conference on Communication and Electronics Systems (ICCES) (pp. 1-6). IEEE.
https://doi.org/10.1109/ICCES51350.2021.9489026.
Luevanos, C., Elizarraras, J., Hirschi, K., & Yeh, J. H. (2017, December). Analysis on the security and use of password managers. In 2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT) (pp. 17-24). IEEE. https://doi.org/10.1109/PDCAT.2017.00013.
Maitri, P. V., & Verma, A. (2016, March). Secure file storage in cloud computing using hybrid cryptography algorithm. In 2016 international conference on wireless communications, signal processing and networking (WiSPNET) (pp. 1635-1638). IEEE. https://doi.org/10.1109/WiSPNET.2016.7566416.
Mehta, K., Jain, R., Mittal, P., & Sharma, S. (2022). Cryptocurrency: A critical analysis of embedded big data analytics. SSRN Electronic Journal. https://doi.org/10.2139/ssrn.4025347.
Mushtaq, M. F., Jamel, S., Disina, A. H., Pindar, Z. A., Shakir, N. S. A., & Deris, M. M. (2017). A survey on the cryptographic encryption algorithms. International Journal of Advanced Computer Science and Applications, 8(11). https://doi.org/10.14569/IJACSA.2017.081141.
Pradhan, D., Sahu, P. K., Goje, N. S., Ghonge, M. M., Tun, H. M., Rajeswari, R., & Pramanik, S. (2022). Security, privacy, risk, and safety toward 5G green network (5G‐GN). Cyber Security and Network Security, 193-216. https://doi.org/10.1002/9781119812555.ch9.
Pradhan, D., Tun, H. M., Wah, N. K. S., Oo, T., Priyanka, K. C., & Dash, A. (2022, July). Efficient usage of energy in 5G toward sustainable development inclined to industry 4.0 connectivity. In 2022 IEEE Region 10 Symposium (TENSYMP) (pp. 1-6). IEEE. https://doi.org/10.1109/TENSYMP54529.2022.9864351.
Stobert, E., & Biddle, R. (2014, September). A password manager that does not remember passwords. In Proceedings of the 2014 New Security Paradigms Workshop (pp. 39-52). https://doi.org/10.1145/2683467.2683471.