as .
Pe
fey
Cm Recor Ur cg
ee Ra etd
Pr go
cu
Pee ||)
ar
eno B Ue eR ese
SUBMITTED BY:
Po
(10090202022)
Dt ee a Rel
4S. RACHNA SINGH
Sel aCe)
Py ie) JR INSTITUTE OF
MANAGEME? Cel Bis ¢
PM rE n
(oT "SafeKey:Th
oF
Bachelor of Computer Applications (BCA)
To
Guru Gobind Singh Indraprastha University, Delhi
SUBMITTED BY
Sheffali Sethi
(10090202022)
UNDER THE SUPERVISION OF
MS. RACHNA SINGH
(Assistant Professor)
ee ns
SRIEGURU TEGH BAHADUR INSTITUTE OF
MANAGEMENT AND INFORMATION
TECHNOLOGY
24, GT Karnal Rd, Gurdwara Nanak Piao Campus, Kirpal Bagh, Gujranwala Town, New
. Delhi, Delhi, 110033
: thalPable of contents
S.No.
Tople Pies Ke
ni | Certificate
2 Declaration
[Acknowledgement
| Abstract
[8 | Chapter-4: Testing and Implementation
9 Chapter-5: Conchision and Refe
[10] Annexures
List of Tables
St Tit Page No.
Ie ee be |
1 | User Table
2 | Password analysis Table
3] Common password Table
4 Data dictionary TableList of Figures
S.No. Title Page No,
1” | Entity Relationship Diagram
2 | Data Flow Diagram Level-o mn
3 | Data Flow Diagram Level-1 is
4 | Menu Flow Diagram
| Structure DiagramDeclaration
1 Ms.Sheffali Sethi(10090202022) Declare that the Sum
“SafeKey:The Password Analyser” is done by me and it is an authentic work carrie
embodied in this p
by me during my summer internship at CyberYaan. The matte
¢ or diplom
work has not been submitted earlier for the award of any degr
my knowledge and belief.
ale
te
Signature of the Stu
Name: Sheffali Sethi
Date:Acknowle
dgement
Toffér my sincere thanks and humble Fegards to CyberYaan for
pportunity in domain of “Ethical H, acking
Thave taken efforts in this project However, it would not h:
kind support
lave been possible without
and help of my seniors
at CyberYaan. I would like to extend my sin
to all of them,
cere thank
T would like to express my gratitude ‘owards my parents & members of SGTBIMIT for th
kind co-operation
and encouragement which helped us in completion of this project
Sheffali SethiNY ¥20% @ w4yBUAdOD
naydwsop voneDijnsa)
SNOD 2 ONINIVAL MYVAHIBAD ‘03D
aepea fequeg
183dX3 ONIMDVH TWOIHLA NVVAY3EAD
Posie 5} pue squauiasinbas wesBosd ays iJe payajdusoo Alingssazons sey
IYJ9S IeYaYs
ey) SaynuaD Aqasay ueeduagA>
wuwiuaarg FS)ABSTRACT
Problem Statement
Greate and manage multiple passwords. Weak passwords are often chosen for ease of
bbut expose users to eyberattacks such as brute force or dictionary attacks, Users need a
reliable way to understand the strength of their passwords and improve security. Many user
remain unaware of how vulnerable their passwords are, leading to account compromises.
identity theft, and data breaches
Objective & Scope
The objective of SafeKey is to provide a user-friendly tool that helps users
ts into potential
analyze the strength of their passwords and offers ins
vulnerabilities. By simulating real-world attack methods like brute force and
dictionary attacks, this tool can give users a clearer understanding of how secure
their passwords are and guide them to create stronger passwords
The scope includes:
n: SecureMeter will not only analyze passwords but will also
© User Security Edu
educate users on why certain passwords are weak and how to
attack methods (like brute force
create stronger ones
Attack Simulation: The tool will simulate popular
and dictionary attacks) to calculate how quickly a password could be compromised
* Visual Feedback: SecureMeter will provide real-time feedback through graphical
Fepresentations, showing users how their passwords measure up in terms of str
® Wide User Base: The tool is designed for both general users who want to se&
anizations looking to improve password policies
Personal accounts and orMet
hodology
Res Research various attack methods and identify common weak
points in password security
Development: Implement a web-based interface using HTML, CSS, and
s for graphical feedback
JavaScript, along with libraries like Chart
Attack Simulations: Integrate password cracking simulations like bru
combinations) and dictionary attacks (using a
force (checking all possib!
list of commonly used passwords).
Visualization: Use charts and color-coded indicators to provide feedback
on password strength, where red indicates weak passwords and green
indicates strong passwords.
Testing: Test the tool with different passwords to ensure accuracy in
feedback and usability
Modules
User Input Module.
Users ean input their password into a secure input field.
The system checks the length and characters used in the password.
Estimates the time it would take for a brute force attack to crack the password by
trying every possible character combination.
Dictionary Attack Simulation Module
Checks if the password exists in alist of commonly used passwords (a dictionary).
Calculates how fast the password can be cracked using a dictionary attack
Strength Analyzer Module:
Provides feedback on the password's complexity (¢.g., presence of uppercase letters,
numbers, symbols).Assigns a strength score based on password length, complexity, and vu
common attack methods,
yi
ph
Displays password strength and vulnerability using color-coded
Provides visual feedback on the time it would take to crack the password usin
different method
mendations Module:
Feedback and Reco
password based 0
+ pass
Offers personalized su
of stronger
exampl
Explains why the current password is weak and provid:
alternatives,CHAPTER 1:
PROBLEM
FORMULATION1.1 Introduction about he Company
Cyber Yaan chatbot is an
USP organization fueled by innovation, with u mission to reshape th
PBR asbiOPY: They Bo beyond merely providing ec
merely providing technological resolutions; instead
they harness the game-ck
hanging, potential of Cybs \
ybersecurity to pioneer a new epoch of donor
interaction and charity manapen
Laka Ment. Iisa cutting-edge cybersecurity platform that provide
ailored customer interaction, realtime data anal
me data analysis through Al-powered Analyzer, and a
Vinual Knowledge Replica & Advisor available 24/7, 1 emphasizes data security
multilingual support, and se: ia e
PPort, and seamless integration with existing platforms. Trusted globally, it is
edieated to transforming knowledge access and elevating learning experiences.
1.2 Introduction about the Problem
he increasing reliance on online services, social platforms, and applications
In the digital era,
has heightened the need for secure passwords to protect sensitive information. However,
any users continue to use Weak or predictable passwords, which can easily be compromised.
through brute force or dictionary attacks. This issue poses significant security risks, leading
to identity thet, data breaches, and unauthorized access to personal or corporate information.
The problem of weak password usage highlights the need for effective tools that help users
-
evaluate and strengthen their passwords, safeguarding their data and priva
of th
1.3 Present Si
Currently, there are various password strength analyzers and security tools available online,
ranging from basic password strength meters to more sophisticated analyzers that simulate
ed on length, complexity, and the presence
attacks, Most of these tools evaluate passwords bas
of special characters. However, many tools do not provide in-depth analysis or fail to
. Some
simulate real-world attack methods like brute force or dictionary attacks effectively.
advanced tools, like LastPass and Dashlane, integrate password management with strength
assessment, but they may require users to create accounts or subscribe to premium services.
and easily accessible tools that
There is a growing demand for more comprehensive, fre
offer better insights into password vulnerabilities.© Level 1 DED:
€
-
ee :
33 Input Design
sis. The input
Input design focuses on ensuring that users can easily input passwords for a
mechanism is simple and use
friendly:
+ Password Input Field: A single password field where users enter the password they
want to analyze.
+ Validatio
user understands the simulation results.
Input validation to ensure the password field is not left blank and that the
Security: The password is not stored in the system, and all operations are performed
client-side to enhance privacy.
| The input design ensures ease of use while maintaining the necessary security protocols.
3.4 Output Design
The output design presents password strength analysis results o the user ina clear, concise,
and visually appealing manner. Results include
sword using both
the estimated time to crack the pas
‘Text-Based Feedback: Display
brute force and dictionary attacks:
1 that visually compares the strength of the
Representation: A bar ch
Graphical
‘ommon password cracking methods
password against c
Wy
lt ‘+ Color Coding: Uses color
10 immediately com,
t 'Y communicate the seeurity lever
Ouiput is delivered dynamically atter the Ch
'ser inputs their password, and the visual element
he SafeKey project is structure,
Tr Pect Is structured using modular, reusable code, following the Model-View
Controller (MVC) architecture for maintainability and scatabit
inability and scalability
* Model: Handles the logic
for password analysis, including brute force simulation and
dictionary attack lookups, This layer can later integrate with a database for storing
analysis results.
CODE
function simulateBruteForce(password) { /* Logie for brute force simulation */ }
for dictionary attack */ }
function simulateDictionaryAttack (password) { /* Li
View: The front-end design written in HTMLICSS. It renders the user interface.
and displaying the results of password analysis.
taking inputs from the u
Rnter your password |
CODE:
Simulate Attack
"crack TimeChart">