PROJECT EXHIBITION
MENTOR/GUIDE:
D R S A R AVA N A N
• GROUP MEMBERS:
• MALHAR DESAI (20BAI10378)
• S O U M I K PAT R A ( 2 0 B A I 1 0 3 3 6 )
• T U H I N B I S WA S ( 2 0 B A I 1 0 2 5 0 )
• JAKKAM RENU SHASHIDHAR (20BAI10009)
PROJECT DOMAIN:
A P P L I C AT I O N P R O J E C T S W I T H M O D E R N
LANGUAGES
•LANGUAGE USED : PYTHON
•APPLICATION PROJECT :
PASSWORD GENERATOR
AND VALIDATOR
INTRODUCTION
W H AT A R E PA S S W O R D S ?
• I N S I M P L E T E R M S , A PA S S W O R D I S A S E C R E T
D ATA W H I C H H E L P S I D E N T I F Y A N D P R O T E C T
U S E R ' S P E R S O N A L I N F O R M AT I O N / I D E N T I T Y.
• G E N E R A L LY, A PA S S W O R D I S A N A R B I T R A RY
S T R I N G O F C H A R A C T E R S I N C L U D I N G L E T T E R S ,
N U M B E R S , D I G I T S O R O T H E R S Y M B O L S
A C C E S S I B L E B Y T H E K E Y B O A R D .
• D E S P I T E T H E N A M E " PA S S W O R D " , I T D O E S N ' T
N E C E S S A R I LY N E E D T O B E A N A C T U A L W O R D O R
T H E W O R D I T S E L F, W H E R E A S I T S H O U L D B E A
M I X O F D I F F E R E N T C H A R A C T E R S A N D
L E T T E R S W H I C H I S T H E M O S T D E S I R A B L E
A S P E C T O F C H O O S I N G A PA S S W O R D .
U N D E R S TA N D I N G
THE NEED OF
PA S S W O R D S
D ATA S E C U R I T Y
STILL HAS A LONG
WAY T O G O . . . .
• Hacking used to be about having fun, now it's no more than a source of profits.
• Penetrating information systems has become an illegal industry worth billions.
Criminals flock to hacking to take advantage of all the money there is to be
made.
• Most people and small businesses don’t think they can be victims of hacking.
Most hackers indeed target large companies or government institutions.
• But the cold truth is cybercriminals are ruthless and can target anyone.
S O M E S TAT I S T I C S O N
S O , H O W C A N W E P L AY O U R PART TO
P R OT E C T OU R S E LV E S A GA I N S T T HI S ?
WHY DO WE NEED A STRONG
PA S S W O R D ?
• As discussed from the previous slides regarding data breach being common these days, we need to be careful
and aware of the information we throw online. Unauthorized access is a potentially major problem for anyone
who uses a computer or high-tech devices such as smartphones or tablets.
• The consequences for victims of these break-ins can include the loss of valuable data such as presentations,
emails, and music. Victims may also have their bank account information, money, or even their identity stolen.
Moreover, unauthorized users may use someone else's computer to break the law, which could put the victim in
legal trouble.
• One of the most common ways that hackers break into computers is by guessing
passwords. Simple and commonly used passwords enable intruders to easily
gain access and control of a computing device .
E X I S T I N G T I P S / P O I N T S F O R PA S S W O R D
SECURITY
• Most importantly, passwords must be long and complex.
• Long and complex passwords require more effort and time for a hacker to guess.
• Passwords should contain at least ten characters and have a combination of characters
such as commas, percent signs, and parentheses, as well as upper-case and lower-case
letters and numbers.
• Users should never write down their passwords, as that makes it easier for the passwords
to be stolen and used by someone else.
• Also, never use the same password for two or more devices, as hackers who break into
one machine will try to use the same password to take control of others.
HOW LONG
SHOULD A
PA S S W O R D
BE?
SOLUTION / PROPOSED WORK
USE OF PASSWORD GENERATOR
AIM: TO GENERATE STRONG AND
EFFICIENT PASSWORDS
OBJECTIVES: U S E R S W O N ' T H AV E
T O T H I N K A N D T RY O U T D I F F E R E N T
C O M B I N AT I O N S O F PA S S W O R D S B Y
T H E M S E LV E S B E C A U S E T H E
A P P L I C AT I O N W I L L D O I T I T S E L F.
SCOPE AND REAL TIME USAGE:
PA S S W O R D G E N E R AT O R W I L L
G E N E R AT E T H E C O M B I N AT I O N O F
L E T T E R S ( B O T H U P P E R C A S E A N D
L O W E R ) , C H A R A C T E R S A N D E V E N
S Y M B O L S C O N S I D E R I N G T H E L E N G T H
A S A FA C T O R A S P E R U S E R ' S
C O N V E N I E N C E W H I C H W O U L D B E T H E
H A R D WA R E A N D S O F T WA R E
REQUIREMENTS FOR THE PROJECT
PROCESSORS: INTEL
ATOM® PROCESSOR OR INTEL®
CORE™ I3 PROCESSOR
DISK SPACE: 1 GB
OPERATING SYSTEMS: WINDOWS* 7
OR LATER, MACOS, AND LINUX
SOFTWARE: PYTHON (LATEST
VERSION PREFFERED)
OBJECTIVE and problem statement
USE OF PASSWORD GENERATOR AND
PASSWOR VALIDATOR
D o AIM : TO GENERATE PASSWORDS WHICH
MATCHES THE PASSWORD CRITERIA AND
CRITERIA VALIDATES IT FOR GENERAL USE.
• 8 characters o OBJECTIVE : TO PROVIDE THE USER
or more WITH AN APPLICATION WHICH ITSELF
• Mix of upper GENERATES PASSWORD FOR PERSONAL
case and USE AND ALSO GIVE THE FREEDOM TO
CREATE A PASSWORD THROUGH USER
lower-case INPUT WHICH WILL FURTHER GIVE
alphabets VALIDATION AND FEEDBACK TO
• Mix of letters THE USER.
and numbers
ARCHITECTURE
AND FLOW
DIAGRAM ON
HOW THE
APPLICATION
language used : python
1. Imported modules : Tkinter, random,
array, Re, pyperclip
2. USE OF Ascii characters (upper and
lower), symbols, digits
3. Concatenation of strings and
randomization
CONCEPTS and
MATERIALS USED
ECTURE
AND START
FLOW
DIAGRA GIVE THE
MAXIMUM
M LENGTH OF
PASSWORD
DECLARE
NEEDED
ARRAY OF
CHARACTERS,
DIGITS,
SYMBOLS TO BE
DIGITS
USED =
GENERATE
RANDOM DIGITS
GENERATES
RANDOM
UPPERCASE
LETTERS FROM= A
LOWERCASE
TO Z
GENERATES
RANDOM
LOWERCASE
LETTERS FROM a
to z
SYMBOLS =
GENERATES
RANDOM SYMBOLS
LIKE ! , @ , # , $ , % ,
ARRAYS INTO A SINGLE
ARRAY AND USE
RANDOM.CHOICE ( ) TO
PRODUCE A NEW
STRING WHICH WILL
BE STORED AS
OUTPUT/
PASSWORD
PRINT
(PASSWORD
)
CHECK
FOR
VALIDITY
LENGTH
Y OF N
E PASSWOR O
CHECK
Y FOR
VALIDIT N
E
Y if O
S (A-Z) and
(a-z)
CHECK
Y FOR N
E VALIDI O
S TY if 0-
9 exists
CHECK
Y FOR
E VALIDI N
S TY if O
SYMBO
PRINT
PRINT ( "NOT
( "VALID
VALID
PASSWORD"
PASSWORD" )
)
STOP
EXPLAINATI
ON on
MODULE PR
OTOTYPE /
DEMO
50 % MODULE
IMPLEMENTATION/de
mo SCREENSHOTS
WITH OUTPUT
SNAPSHOTS OF COMPLETE
PROJECT
F I N A L D E M O N S T R AT I O N
A N D E X P L A I N AT I O N
CONCLUSION
Random Password Ge
nerator
Password Validator
REFE Password Strength
RENC
ES
THANK
YOU!