0% found this document useful (0 votes)
21 views35 pages

Password Generator and Validator - Project Exhibition

Password Gen

Uploaded by

Knull Desai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
21 views35 pages

Password Generator and Validator - Project Exhibition

Password Gen

Uploaded by

Knull Desai
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PPTX, PDF, TXT or read online on Scribd
You are on page 1/ 35

PROJECT EXHIBITION

MENTOR/GUIDE:
D R S A R AVA N A N
• GROUP MEMBERS:

• MALHAR DESAI (20BAI10378)

• S O U M I K PAT R A ( 2 0 B A I 1 0 3 3 6 )

• T U H I N B I S WA S ( 2 0 B A I 1 0 2 5 0 )

• JAKKAM RENU SHASHIDHAR (20BAI10009)


PROJECT DOMAIN:
A P P L I C AT I O N P R O J E C T S W I T H M O D E R N
LANGUAGES

•LANGUAGE USED : PYTHON


•APPLICATION PROJECT :
PASSWORD GENERATOR
AND VALIDATOR
INTRODUCTION

W H AT A R E PA S S W O R D S ?
• I N S I M P L E T E R M S , A PA S S W O R D I S A S E C R E T
D ATA W H I C H H E L P S I D E N T I F Y A N D P R O T E C T
U S E R ' S P E R S O N A L I N F O R M AT I O N / I D E N T I T Y.

• G E N E R A L LY, A PA S S W O R D I S A N A R B I T R A RY
S T R I N G O F C H A R A C T E R S I N C L U D I N G L E T T E R S ,
N U M B E R S , D I G I T S O R O T H E R S Y M B O L S
A C C E S S I B L E B Y T H E K E Y B O A R D .

• D E S P I T E T H E N A M E " PA S S W O R D " , I T D O E S N ' T


N E C E S S A R I LY N E E D T O B E A N A C T U A L W O R D O R
T H E W O R D I T S E L F, W H E R E A S I T S H O U L D B E A
M I X O F D I F F E R E N T C H A R A C T E R S A N D
L E T T E R S W H I C H I S T H E M O S T D E S I R A B L E
A S P E C T O F C H O O S I N G A PA S S W O R D .
U N D E R S TA N D I N G

THE NEED OF

PA S S W O R D S
D ATA S E C U R I T Y
STILL HAS A LONG
WAY T O G O . . . .
• Hacking used to be about having fun, now it's no more than a source of profits.

• Penetrating information systems has become an illegal industry worth billions.


Criminals flock to hacking to take advantage of all the money there is to be
made.

• Most people and small businesses don’t think they can be victims of hacking.
Most hackers indeed target large companies or government institutions.
• But the cold truth is cybercriminals are ruthless and can target anyone.
S O M E S TAT I S T I C S O N

S O , H O W C A N W E P L AY O U R PART TO

P R OT E C T OU R S E LV E S A GA I N S T T HI S ?
WHY DO WE NEED A STRONG
PA S S W O R D ?
• As discussed from the previous slides regarding data breach being common these days, we need to be careful
and aware of the information we throw online. Unauthorized access is a potentially major problem for anyone
who uses a computer or high-tech devices such as smartphones or tablets.
• The consequences for victims of these break-ins can include the loss of valuable data such as presentations,
emails, and music. Victims may also have their bank account information, money, or even their identity stolen.
Moreover, unauthorized users may use someone else's computer to break the law, which could put the victim in
legal trouble.

• One of the most common ways that hackers break into computers is by guessing
passwords. Simple and commonly used passwords enable intruders to easily
gain access and control of a computing device .
E X I S T I N G T I P S / P O I N T S F O R PA S S W O R D
SECURITY

• Most importantly, passwords must be long and complex.


• Long and complex passwords require more effort and time for a hacker to guess.
• Passwords should contain at least ten characters and have a combination of characters
such as commas, percent signs, and parentheses, as well as upper-case and lower-case
letters and numbers.
• Users should never write down their passwords, as that makes it easier for the passwords
to be stolen and used by someone else.
• Also, never use the same password for two or more devices, as hackers who break into
one machine will try to use the same password to take control of others.
HOW LONG
SHOULD A
PA S S W O R D
BE?
SOLUTION / PROPOSED WORK

USE OF PASSWORD GENERATOR

AIM: TO GENERATE STRONG AND


EFFICIENT PASSWORDS

OBJECTIVES: U S E R S W O N ' T H AV E
T O T H I N K A N D T RY O U T D I F F E R E N T
C O M B I N AT I O N S O F PA S S W O R D S B Y
T H E M S E LV E S B E C A U S E T H E
A P P L I C AT I O N W I L L D O I T I T S E L F.

SCOPE AND REAL TIME USAGE:


PA S S W O R D G E N E R AT O R W I L L
G E N E R AT E T H E C O M B I N AT I O N O F
L E T T E R S ( B O T H U P P E R C A S E A N D
L O W E R ) , C H A R A C T E R S A N D E V E N
S Y M B O L S C O N S I D E R I N G T H E L E N G T H
A S A FA C T O R A S P E R U S E R ' S
C O N V E N I E N C E W H I C H W O U L D B E T H E
H A R D WA R E A N D S O F T WA R E
REQUIREMENTS FOR THE PROJECT

PROCESSORS: INTEL
ATOM® PROCESSOR OR INTEL®
CORE™ I3 PROCESSOR
DISK SPACE: 1 GB
OPERATING SYSTEMS: WINDOWS* 7
OR LATER, MACOS, AND LINUX
SOFTWARE: PYTHON (LATEST
VERSION PREFFERED)
OBJECTIVE and problem statement

USE OF PASSWORD GENERATOR AND


PASSWOR VALIDATOR
D o AIM : TO GENERATE PASSWORDS WHICH
MATCHES THE PASSWORD CRITERIA AND
CRITERIA VALIDATES IT FOR GENERAL USE.
• 8 characters o OBJECTIVE : TO PROVIDE THE USER
or more WITH AN APPLICATION WHICH ITSELF
• Mix of upper GENERATES PASSWORD FOR PERSONAL
case and USE AND ALSO GIVE THE FREEDOM TO
CREATE A PASSWORD THROUGH USER
lower-case INPUT WHICH WILL FURTHER GIVE
alphabets VALIDATION AND FEEDBACK TO
• Mix of letters THE USER.
and numbers
ARCHITECTURE
AND FLOW
DIAGRAM ON
HOW THE
APPLICATION
language used : python
1. Imported modules : Tkinter, random,
array, Re, pyperclip
2. USE OF Ascii characters (upper and
lower), symbols, digits
3. Concatenation of strings and
randomization

CONCEPTS and
MATERIALS USED
ECTURE
AND START
FLOW
DIAGRA GIVE THE
MAXIMUM
M LENGTH OF
PASSWORD
DECLARE
NEEDED
ARRAY OF
CHARACTERS,
DIGITS,
SYMBOLS TO BE
DIGITS
USED =
GENERATE
RANDOM DIGITS
GENERATES
RANDOM
UPPERCASE
LETTERS FROM= A
LOWERCASE
TO Z
GENERATES
RANDOM
LOWERCASE
LETTERS FROM a
to z
SYMBOLS =
GENERATES
RANDOM SYMBOLS
LIKE ! , @ , # , $ , % ,
ARRAYS INTO A SINGLE
ARRAY AND USE
RANDOM.CHOICE ( ) TO
PRODUCE A NEW
STRING WHICH WILL
BE STORED AS
OUTPUT/
PASSWORD
PRINT
(PASSWORD
)
CHECK
FOR
VALIDITY
LENGTH
Y OF N
E PASSWOR O
CHECK
Y FOR
VALIDIT N
E
Y if O
S (A-Z) and
(a-z)
CHECK
Y FOR N
E VALIDI O
S TY if 0-
9 exists
CHECK
Y FOR
E VALIDI N
S TY if O
SYMBO
PRINT
PRINT ( "NOT
( "VALID
VALID
PASSWORD"
PASSWORD" )
)

STOP
EXPLAINATI
ON on
MODULE PR
OTOTYPE /
DEMO
50 % MODULE
IMPLEMENTATION/de
mo SCREENSHOTS
WITH OUTPUT
SNAPSHOTS OF COMPLETE
PROJECT
F I N A L D E M O N S T R AT I O N
A N D E X P L A I N AT I O N
CONCLUSION
Random Password Ge
nerator

Password Validator

REFE Password Strength

RENC
ES
THANK
YOU!

You might also like