Skip to main content

Password Generation Based on Song Lyrics and Its Management

  • Conference paper
  • First Online:
Advances in Computing and Data Sciences (ICACDS 2022)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 1614))

Included in the following conference series:

  • 715 Accesses

Abstract

This paper focuses on creating a Password Manager which is secure and easy-to-remember. Password managers prove efficient in generating and storing passwords but they were never able to generate passwords that people could remember easily. Our password manager solves this by creating passwords using song lyrics. Instead of generating passwords randomly, our tool will create passwords from the lyrics of the song selected by the user. The passwords generated are checked thoroughly for validity, by using the haveibeenpwned API(data breach checks) and are made secure by making combinations of letters, numbers special characters of the password and suggesting the best secure password from the list.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

References

  1. Maruthi, S., Manchikanti, B., Chetan Babu, G., Harini, N.: A secure scheme to manage complex password capable of overcoming human memory limitations. Int. J. Recent Technol. Eng. 7(5), 137–143 (2019)

    Google Scholar 

  2. Luevanos, C., Elizarraras, J., Hirschi, K., Yeh, J.-H.: Analysis on the security and use of password managers. In: 2017 18th International Conference on Parallel and Distributed Computing, Applications and Technologies (PDCAT), pp. 17–24. IEEE (2017)

    Google Scholar 

  3. Karole, A., Saxena, N., Christin, N.: A comparative usability evaluation of traditional password managers. In: Rhee, K.-H., Nyang, D.H. (eds.) ICISC 2010. A comparative usability evaluation of traditional password managers, vol. 6829, pp. 233–251. Springer, Heidelberg (2011). https://doi.org/10.1007/978-3-642-24209-0_16

    Chapter  Google Scholar 

  4. Haugum, T., Rygh, L.-C.K.: Design, implementation and analysis of a theft-resistant password manager based on kamouflage architecture. Master’s thesis, Universitetet i Agder; University of Agder (2015)

    Google Scholar 

  5. Halderman, J.A., Waters, B., Felten, E.W.: A convenient method for securely managing passwords. In: Proceedings of the 14th International Conference on World Wide Web, WWW ’05, pp. 471–479. Association for Computing Machinery, New York (2005)

    Google Scholar 

  6. Pearman, S., Zhang, S. A., Bauer, L., Christin, N., Cranor, L.F.: Why people (don’t) use password managers effectively. In: Fifteenth Symposium on Usable Privacy and Security (SOUPS 2019), pp. 319–338. USENIX Association, Santa Clara (2019)

    Google Scholar 

  7. Li, Z., He, W., Akhawe, D., Song, D.: The emperor’s new password manager: security analysis of web-based password managers. In: 23rd USENIX Security Symposium (USENIX Security 14), pp. 465–479 (2014)

    Google Scholar 

  8. Pham, N., Chow, M.: The security of password managers. Usability News 9(1), 2833–2836 (2016)

    Google Scholar 

  9. Pearman, S., et al.: Let’s go in for a closer look: Observing passwords in their natural habitat. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security, CCS 2017, pp. 295–310. Association for Computing Machinery, New York (2017)

    Google Scholar 

  10. Shancang, L., Romdhani, I., Buchanan, W.: Password pattern and vulnerability analysis for web and mobile applications. ZTE Commun. 32, 1 (2016)

    Google Scholar 

  11. Sethumadhavan, Praveen, I.: Partial password authentication using vector decomposition. Int. J. Pure Appl. Math. 118(7), 381–86 (2018)

    Google Scholar 

  12. Sreedevi, M., Praveen, I.: Password authentication using vector decomposition. Int. J. Control Theory Appl. 9, 4639–4645 (2016)

    Google Scholar 

  13. Sivapriya, K., Deepthi, L.R.: Password strength analyzer using segmentation algorithms. In: 2020 5th International Conference on Communication and Electronics Systems (ICCES), pp. 605–611. IEEE (2020)

    Google Scholar 

  14. Api key. Have I Been Pwned. (n.d.). https://haveibeenpwned.com/api/v2/breachedaccount/account

  15. SubtleCrypto.decrypt() - web apis: MDN. Web APIs — MDN. (n.d.), from https://developer.mozilla.org/en-US/docs/Web/API/SubtleCrypto/decrypt

  16. Tkinter - Python interface to TCL/TK. tkinter - Python interface to Tcl/Tk - Python 3.10.2 documentation. (n.d.), from https://docs.python.org/3/library/tkinter.html

  17. SQLITE3 - DB-API 2.0 interface for SQLite databases. sqlite3 - DB-API 2.0 interface for SQLite databases - Python 3.10.2 documentation. (n.d.), from https://docs.python.org/3/library/sqlite3.html

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to M. Hemchudaesh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Sai Kishan, E., Hemchudaesh, M., Gowri Shankar, B., Sai Brahadeesh, B., Jevitha, K.P. (2022). Password Generation Based on Song Lyrics and Its Management. In: Singh, M., Tyagi, V., Gupta, P.K., Flusser, J., Ören, T. (eds) Advances in Computing and Data Sciences. ICACDS 2022. Communications in Computer and Information Science, vol 1614. Springer, Cham. https://doi.org/10.1007/978-3-031-12641-3_23

Download citation

  • DOI: https://doi.org/10.1007/978-3-031-12641-3_23

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-031-12640-6

  • Online ISBN: 978-3-031-12641-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics