Secure Pass: Intelligent Password Management and Robust Strength Analysis
Keywords:
API, Chrome extension, Cybersecurity, Flask data protection, Heuristic analysis, Machine learning, Password management, Password strength analysis, Secure password generationAbstract
In today's digital landscape, password security is a crucial aspect of cybersecurity, yet weak and reused passwords continue to pose significant risks. SecurePass is an intelligent password management system designed to enhance security by securely storing user credentials while providing advanced password strength analysis. Utilizing a Flask-based backend for secure storage and evaluation, along with a Chrome extension for real-time interaction, SecurePass combines heuristic rules and machine learning models to assess password resilience against cyber threats. The system offers instant feedback, generates strong passwords, and provides proactive recommendations to encourage better security practices. Additionally, it incorporates breach detection, alerting users if their credentials have been compromised. By integrating robust encryption, intelligent analysis, and real-time guidance, SecurePass empowers users to strengthen their authentication practices and mitigate vulnerabilities effectively. Beyond evaluation, SecurePass actively encourages users to adopt stronger security practices by generating complex, unique passwords and providing tailored recommendations based on detected weaknesses. It also includes breach detection capabilities, alerting users when their credentials are exposed in known data breaches. By integrating proactive security measures and real-time feedback, SecurePass aims to significantly enhance password hygiene, mitigate risks associated with weak authentication, and empower users with better control over their digital security.
References
H. Padalia, H. Patel, A. Deshmukh, M. Patil, A. Kumar, and N. K. Nrip, “A Study on Password Manager: Users’ Perspective,” 2023 International Conference on Computational Intelligence for Information, Security and Communication Applications , Jun. 2023, doi: https://doi.org/10.1109/ciisca59740.2023.00024
K. Sivapriya and L. R. Deepthi, “Password Strength Analyser Using Segmentation Algorithms,” IEEE Xplore, Jun. 01, 2020. https://doi.org/10.1109/ICCES48766.2020.9138011
S. Chakrabarti and M. Singhal, “Password-Based Authentication: Preventing Dictionary Attacks,” Computer, vol. 40, no. 6, pp. 68–74, Jun. 2007, doi: https://doi.org/10.1109/mc.2007.216
M. Mehta, K. Siddhardha, and B. Yamini, “Enhanced Password Security through Multi-Split Encryption and Recovery,” 2023 International Conference on Research Methodologies in Knowledge Management, Artificial Intelligence and Telecommunication Engineering (RMKMATE), Nov. 2023, doi: https://doi.org/10.1109/rmkmate59243.2023.10368929
S. Sarkar and M. Nandan, “Password Strength Analysis and its Classification by Applying Machine Learning Based Techniques,” 2022 Second International Conference on Computer Science, Engineering and Applications (ICCSEA), Sep. 2022, doi: https://doi.org/10.1109/iccsea54677.2022.9936117
L. Thanh, T. Takii, and H. Tanaka, “Password Classification Using Machine Learning and Natural Language Processing Techniques: Methods and Evaluations,” pp. 147–150, Dec. 2024, doi: https://doi.org/10.1109/csnet64211.2024.10851759
L. Yang, Y. Qin, X. Qin, and D. Zhang, “A password-authentication scheme based on ciphertext random sampling transmission,” 2022 IEEE 21st International Conference on Ubiquitous Computing and Communications (IUCC/CIT/DSCI/SmartCNS), pp. 373–380, Dec. 2022, doi: https://doi.org/10.1109/iucc-cit-dsci-smartcns57392.2022.00064
J. A and M. T. M, “Hardware-Independent Authentication Scheme Using Intelligent Captcha Technique,” 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), vol. 2019 IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), pp. 1–7, Feb. 2019, doi: https://doi.org/10.1109/icecct.2019.8869353 .
T. T. Nguyen and Q. U. Nguyen, “An analysis of Persuasive Text Passwords,” 2015 2nd National Foundation for Science and Technology Development Conference on Information and Computer Science (NICS), Sep. 2015, doi: https://doi.org/10.1109/nics.2015.7302207
M. B. Barka, L. Granboulan, and F. Krief, “Using OTP with PAKE: An Optimized Implementation of a Synchronization Window,” HAL (Le Centre pour la Communication Scientifique Directe), pp. 1–5, Feb. 2011, doi: https://doi.org/10.1109/ntms.2011.5720659