0% found this document useful (0 votes)
29 views49 pages

STR Project

The document outlines a project titled 'SafeKey: The Password Analyser,' developed by Sheffali Sethi under the supervision of Ms. Rachna Singh at the JR Institute of Management. The tool aims to help users analyze the strength of their passwords and improve security by simulating real-world attack methods, providing visual feedback, and educating users on password vulnerabilities. The document includes sections on methodology, testing, and implementation, emphasizing the need for secure password practices in the digital era.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
0% found this document useful (0 votes)
29 views49 pages

STR Project

The document outlines a project titled 'SafeKey: The Password Analyser,' developed by Sheffali Sethi under the supervision of Ms. Rachna Singh at the JR Institute of Management. The tool aims to help users analyze the strength of their passwords and improve security by simulating real-world attack methods, providing visual feedback, and educating users on password vulnerabilities. The document includes sections on methodology, testing, and implementation, emphasizing the need for secure password practices in the digital era.
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF or read online on Scribd
You are on page 1/ 49
as . Pe fey Cm Recor Ur cg ee Ra etd Pr go cu Pee ||) ar eno B Ue eR ese SUBMITTED BY: Po (10090202022) Dt ee a Rel 4S. RACHNA SINGH Sel aCe) Py ie) JR INSTITUTE OF MANAGEME? Cel Bis ¢ PM rE n (oT " SafeKey:Th oF Bachelor of Computer Applications (BCA) To Guru Gobind Singh Indraprastha University, Delhi SUBMITTED BY Sheffali Sethi (10090202022) UNDER THE SUPERVISION OF MS. RACHNA SINGH (Assistant Professor) ee ns SRIEGURU TEGH BAHADUR INSTITUTE OF MANAGEMENT AND INFORMATION TECHNOLOGY 24, GT Karnal Rd, Gurdwara Nanak Piao Campus, Kirpal Bagh, Gujranwala Town, New . Delhi, Delhi, 110033 : thal Pable of contents S.No. Tople Pies Ke ni | Certificate 2 Declaration [Acknowledgement | Abstract [8 | Chapter-4: Testing and Implementation 9 Chapter-5: Conchision and Refe [10] Annexures List of Tables St Tit Page No. Ie ee be | 1 | User Table 2 | Password analysis Table 3] Common password Table 4 Data dictionary Table List of Figures S.No. Title Page No, 1” | Entity Relationship Diagram 2 | Data Flow Diagram Level-o mn 3 | Data Flow Diagram Level-1 is 4 | Menu Flow Diagram | Structure Diagram Declaration 1 Ms.Sheffali Sethi(10090202022) Declare that the Sum “SafeKey:The Password Analyser” is done by me and it is an authentic work carrie embodied in this p by me during my summer internship at CyberYaan. The matte ¢ or diplom work has not been submitted earlier for the award of any degr my knowledge and belief. ale te Signature of the Stu Name: Sheffali Sethi Date: Acknowle dgement Toffér my sincere thanks and humble Fegards to CyberYaan for pportunity in domain of “Ethical H, acking Thave taken efforts in this project However, it would not h: kind support lave been possible without and help of my seniors at CyberYaan. I would like to extend my sin to all of them, cere thank T would like to express my gratitude ‘owards my parents & members of SGTBIMIT for th kind co-operation and encouragement which helped us in completion of this project Sheffali Sethi NY ¥20% @ w4yBUAdOD naydwsop voneDijnsa) SNOD 2 ONINIVAL MYVAHIBAD ‘03D aepea fequeg 183dX3 ONIMDVH TWOIHLA NVVAY3EAD Posie 5} pue squauiasinbas wesBosd ays iJe payajdusoo Alingssazons sey IYJ9S IeYaYs ey) SaynuaD Aqasay ueeduagA> wuwiuaarg FS) ABSTRACT Problem Statement Greate and manage multiple passwords. Weak passwords are often chosen for ease of bbut expose users to eyberattacks such as brute force or dictionary attacks, Users need a reliable way to understand the strength of their passwords and improve security. Many user remain unaware of how vulnerable their passwords are, leading to account compromises. identity theft, and data breaches Objective & Scope The objective of SafeKey is to provide a user-friendly tool that helps users ts into potential analyze the strength of their passwords and offers ins vulnerabilities. By simulating real-world attack methods like brute force and dictionary attacks, this tool can give users a clearer understanding of how secure their passwords are and guide them to create stronger passwords The scope includes: n: SecureMeter will not only analyze passwords but will also © User Security Edu educate users on why certain passwords are weak and how to attack methods (like brute force create stronger ones Attack Simulation: The tool will simulate popular and dictionary attacks) to calculate how quickly a password could be compromised * Visual Feedback: SecureMeter will provide real-time feedback through graphical Fepresentations, showing users how their passwords measure up in terms of str ® Wide User Base: The tool is designed for both general users who want to se& anizations looking to improve password policies Personal accounts and or Met hodology Res Research various attack methods and identify common weak points in password security Development: Implement a web-based interface using HTML, CSS, and s for graphical feedback JavaScript, along with libraries like Chart Attack Simulations: Integrate password cracking simulations like bru combinations) and dictionary attacks (using a force (checking all possib! list of commonly used passwords). Visualization: Use charts and color-coded indicators to provide feedback on password strength, where red indicates weak passwords and green indicates strong passwords. Testing: Test the tool with different passwords to ensure accuracy in feedback and usability Modules User Input Module. Users ean input their password into a secure input field. The system checks the length and characters used in the password. Estimates the time it would take for a brute force attack to crack the password by trying every possible character combination. Dictionary Attack Simulation Module Checks if the password exists in alist of commonly used passwords (a dictionary). Calculates how fast the password can be cracked using a dictionary attack Strength Analyzer Module: Provides feedback on the password's complexity (¢.g., presence of uppercase letters, numbers, symbols). Assigns a strength score based on password length, complexity, and vu common attack methods, yi ph Displays password strength and vulnerability using color-coded Provides visual feedback on the time it would take to crack the password usin different method mendations Module: Feedback and Reco password based 0 + pass Offers personalized su of stronger exampl Explains why the current password is weak and provid: alternatives, CHAPTER 1: PROBLEM FORMULATION 1.1 Introduction about he Company Cyber Yaan chatbot is an USP organization fueled by innovation, with u mission to reshape th PBR asbiOPY: They Bo beyond merely providing ec merely providing technological resolutions; instead they harness the game-ck hanging, potential of Cybs \ ybersecurity to pioneer a new epoch of donor interaction and charity manapen Laka Ment. Iisa cutting-edge cybersecurity platform that provide ailored customer interaction, realtime data anal me data analysis through Al-powered Analyzer, and a Vinual Knowledge Replica & Advisor available 24/7, 1 emphasizes data security multilingual support, and se: ia e PPort, and seamless integration with existing platforms. Trusted globally, it is edieated to transforming knowledge access and elevating learning experiences. 1.2 Introduction about the Problem he increasing reliance on online services, social platforms, and applications In the digital era, has heightened the need for secure passwords to protect sensitive information. However, any users continue to use Weak or predictable passwords, which can easily be compromised. through brute force or dictionary attacks. This issue poses significant security risks, leading to identity thet, data breaches, and unauthorized access to personal or corporate information. The problem of weak password usage highlights the need for effective tools that help users - evaluate and strengthen their passwords, safeguarding their data and priva of th 1.3 Present Si Currently, there are various password strength analyzers and security tools available online, ranging from basic password strength meters to more sophisticated analyzers that simulate ed on length, complexity, and the presence attacks, Most of these tools evaluate passwords bas of special characters. However, many tools do not provide in-depth analysis or fail to . Some simulate real-world attack methods like brute force or dictionary attacks effectively. advanced tools, like LastPass and Dashlane, integrate password management with strength assessment, but they may require users to create accounts or subscribe to premium services. and easily accessible tools that There is a growing demand for more comprehensive, fre offer better insights into password vulnerabilities. © Level 1 DED: € - ee : 33 Input Design sis. The input Input design focuses on ensuring that users can easily input passwords for a mechanism is simple and use friendly: + Password Input Field: A single password field where users enter the password they want to analyze. + Validatio user understands the simulation results. Input validation to ensure the password field is not left blank and that the Security: The password is not stored in the system, and all operations are performed client-side to enhance privacy. | The input design ensures ease of use while maintaining the necessary security protocols. 3.4 Output Design The output design presents password strength analysis results o the user ina clear, concise, and visually appealing manner. Results include sword using both the estimated time to crack the pas ‘Text-Based Feedback: Display brute force and dictionary attacks: 1 that visually compares the strength of the Representation: A bar ch Graphical ‘ommon password cracking methods password against c Wy lt ‘ + Color Coding: Uses color 10 immediately com, t 'Y communicate the seeurity lever Ouiput is delivered dynamically atter the Ch 'ser inputs their password, and the visual element he SafeKey project is structure, Tr Pect Is structured using modular, reusable code, following the Model-View Controller (MVC) architecture for maintainability and scatabit inability and scalability * Model: Handles the logic for password analysis, including brute force simulation and dictionary attack lookups, This layer can later integrate with a database for storing analysis results. CODE function simulateBruteForce(password) { /* Logie for brute force simulation */ } for dictionary attack */ } function simulateDictionaryAttack (password) { /* Li View: The front-end design written in HTMLICSS. It renders the user interface. and displaying the results of password analysis. taking inputs from the u Rnter your password | CODE: Simulate Attack "crack TimeChart">

You might also like