Abstract
This paper focuses on creating a Password Manager which is secure and easy-to-remember. Password managers prove efficient in generating and storing passwords but they were never able to generate passwords that people could remember easily. Our password manager solves this by creating passwords using song lyrics. Instead of generating passwords randomly, our tool will create passwords from the lyrics of the song selected by the user. The passwords generated are checked thoroughly for validity, by using the haveibeenpwned API(data breach checks) and are made secure by making combinations of letters, numbers special characters of the password and suggesting the best secure password from the list.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Similar content being viewed by others
References
Maruthi, S., Manchikanti, B., Chetan Babu, G., Harini, N.: A secure scheme to manage complex password capable of overcoming human memory limitations. Int. J. Recent Technol. Eng. 7(5), 137–143 (2019)
Luevanos, C., Elizarraras, J., Hirschi, K., Yeh, J.-H.: Analysis on the security and use of password managers. In: 2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), pp. 17–24. IEEE (2017)
Karole, A., Saxena, N., Christin, N.: A comparative usability evaluation of traditional password managers. In: Rhee, K.-H., Nyang, D.H. (eds.) ICISC 2010. A comparative usability evaluation of traditional password managers, vol. 6829, pp. 233–251. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24209-0_16
Haugum, T., Rygh, L.-C.K.: Design, implementation and analysis of a theft-resistant password manager based on kamouflage architecture. Master’s thesis, Universitetet i Agder; University of Agder (2015)
Halderman, J.A., Waters, B., Felten, E.W.: A convenient method for securely managing passwords. In: Proceedings of the 14th International Conference on World Wide Web, WWW ’05, pp. 471–479. Association for Computing Machinery, New York (2005)
Pearman, S., Zhang, S. A., Bauer, L., Christin, N., Cranor, L.F.: Why people (don’t) use password managers effectively. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), pp. 319–338. USENIX Association, Santa Clara (2019)
Li, Z., He, W., Akhawe, D., Song, D.: The emperor’s new password manager: security analysis of web-based password managers. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 465–479 (2014)
Pham, N., Chow, M.: The security of password managers. Usability News 9(1), 2833–2836 (2016)
Pearman, S., et al.: Let’s go in for a closer look: Observing passwords in their natural habitat. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 295–310. Association for Computing Machinery, New York (2017)
Shancang, L., Romdhani, I., Buchanan, W.: Password pattern and vulnerability analysis for web and mobile applications. ZTE Commun. 32, 1 (2016)
Sethumadhavan, Praveen, I.: Partial password authentication using vector decomposition. Int. J. Pure Appl. Math. 118(7), 381–86 (2018)
Sreedevi, M., Praveen, I.: Password authentication using vector decomposition. Int. J. Control Theory Appl. 9, 4639–4645 (2016)
Sivapriya, K., Deepthi, L.R.: Password strength analyzer using segmentation algorithms. In: 2020 5th International Conference on Communication and Electronics Systems (ICCES), pp. 605–611. IEEE (2020)
Api key. Have I Been Pwned. (n.d.). https://haveibeenpwned.com/api/v2/breachedaccount/account
SubtleCrypto.decrypt() - web apis: MDN. Web APIs — MDN. (n.d.), from https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/decrypt
Tkinter - Python interface to TCL/TK. tkinter - Python interface to Tcl/Tk - Python 3.10.2 documentation. (n.d.), from https://docs.python.org/3/library/tkinter.html
SQLITE3 - DB-API 2.0 interface for SQLite databases. sqlite3 - DB-API 2.0 interface for SQLite databases - Python 3.10.2 documentation. (n.d.), from https://docs.python.org/3/library/sqlite3.html
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Sai Kishan, E., Hemchudaesh, M., Gowri Shankar, B., Sai Brahadeesh, B., Jevitha, K.P. (2022). Password Generation Based on Song Lyrics and Its Management. In: Singh, M., Tyagi, V., Gupta, P.K., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2022. Communications in Computer and Information Science, vol 1614. Springer, Cham. https://doi.org/10.1007/978-3-031-12641-3_23
Download citation
DOI: https://doi.org/10.1007/978-3-031-12641-3_23
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-031-12640-6
Online ISBN: 978-3-031-12641-3
eBook Packages: Computer ScienceComputer Science (R0)