A Study For An Ideal Password Management System
A Study For An Ideal Password Management System
A Study For An Ideal Password Management System
https://doi.org/10.22214/ijraset.2022.39970
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
Abstract: The growing number of online services needs users to have control over their password management system
(generation, storage, recall). But the demand for total randomness and exclusivity of passwords is impractical in day-to-day life.
Each component of a password management system comes with its cognitive burden on a user. There are many password
management solutions available for users but every one of them has some drawbacks. Password managers have the ability to
help users manage their passwords more successfully while also addressing many of the problems about password-based
authentication. In this study, We're analyzing various previous studies regarding the effectiveness, usability, and security of
password managers of all categories. Also, we're trying to come up with an ideal set of parameters to build the best possible
password management system in 2022. This study will help to understand the key parameters and algorithms that we can use
while building the ideal password generation, storage, and recall system for the user.
I. INTRODUCTION
A. Why Password Managers?
Entropy-based exclusive passwords from the point of security are a valid demand from many online services. But passwords that are
difficult for an attacker to guess are also hard for users to remember, users often create weaker passwords to avoid the cognitive
burden of recalling them. Unfortunately, the number of passwords a user must remember is growing, with the average Internet user
having 25 different online accounts [6]. The fact that various sites have varying complexity rules frequently mitigates exact
password repetition. Users, on the other hand, frequently employ easy tactics to get around these regulations, such as making minor
changes to a popular password (e.g., adding a 1 to the end of a password used on another site). Users often make these adjustments
using a limited set of simple guidelines, which can greatly increase an attacker's ability to guess passwords on other sites [6].
Password managers seek to tackle this problem by generating & storing passwords on a computer device rather than the user having
to do that work and then delivering(recalling) them to the user as needed [9]. Many password managers are available; some are built
into browsers, others are offered by third parties, and many are network-based, such as 1password, where credentials are backed up
to the cloud and synchronized across the user's devices [10].
When it comes to password formation, human memory focuses on familiarity and repetition, putting us open to assault. People
prefer to use the same password with personal information tacked on, according to research on building secure passwords done by
Lo (2016). When requested to change a password, for example, adding a birthdate after the original password or adding the current
month. Our minds can only carry around seven characters, so we can't store the long sequences of random characters required to be
deemed safe in our internet world (Lo, 2016). Yan, Blackwell, Anderson, and Grant (2004) found that personal features such as a
birthdate or pet's name are worthless against specific hacks in a survey of 288 college students[2]. For example, if a hacker uses a
dictionary attack to generate potential passwords using the same phrase, then variants of a password are just as simple to crack (Yan
et al., 2004)[2].
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 976
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
Many password managers additionally assist users in logging into websites by automatically picking and filling in the necessary
username and password (i.e., autofill). If a user has numerous accounts on the site, the password manager will let them choose
which account to use for autofill [1].
The inclination to utilize password managers has a mixed connection with trust. When other characteristics (such as perceived
severity, vulnerability, and so on) are taken into consideration, trust in general technology has little effect, and faith in password
managers has no impact. Individuals' threat assessments of password loss are a more major motivator of password manager adoption
than faith in technology, according to the findings. When comparing technology vs. non-technology solutions, trust is likely to play
a larger role. Password managers are used because of the perceived vulnerability and severity of password loss[3].
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 977
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
The significance of these password generator functions in terms of maximizing the security of their passwords and so assisting them
in remaining secure on the internet by generating 'lengthy and complicated' passwords[4]. We looked at unpredictability and
guessability as indicators of its quality. There is no method to verify that a pseudorandom generator is indistinguishable from
random, as far as we know.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 978
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
The encryption key is referred to as the user's master key if the password manager enables credential encryption. LastPass, for
example, use JavaScript to decrypt and encrypt the user's credential database with a key obtained from the user's master username
and password[7]. By combining a master secret with domain names to dynamically create per-domain passwords, several systems
exist for strengthening user passwords (and eliminating direct password reuse)[8].
V. CONCLUSION
When it comes to password generation, storage, and recall, there are a variety of approaches. Even randomly weak passwords are
likely to be immune to online and offline assaults, therefore choosing passwords of adequate length is still desirable. According to
our study, the length of resistance to online assaults is 10 and the length of resilience to offline attacks is 18. When it comes to
storing local databases and information, AES-256 is the industry standard. For recalling data security and accessibility are provided
by OS-based mobile autofill frameworks, and all frameworks need user engagement prior to autofill. Furthermore, iOS password
autofill encrypts the autofill process for native UI components in apps completely. Localstorage with master password encryption is
considered the best approach in web extensions.
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 979
International Journal for Research in Applied Science & Engineering Technology (IJRASET)
ISSN: 2321-9653; IC Value: 45.98; SJ Impact Factor: 7.538
Volume 10 Issue I Jan 2022- Available at www.ijraset.com
REFERENCES
[1] Oesch, Sean, and Scott Ruoti. "That Was Then, This Is Now: A Security Evaluation of Password Generation, Storage, and Autofill in Browser-Based Password
Managers." USENIX Security Symposium. 2020
[2] Gallagher, Elizabeth A. "Choosing the Right Password Manager." Serials Review 45.1-2 (2019): 84-87
[3] Ayyagari, Ramakrishna, Jaejoo Lim, and Olger Hoxha. "Why Do Not We Use Password Managers? A Study on the Intention to Use Password Managers."
Contemporary Management Research 15.4 (2019): 227-245
[4] Alkaldi, Nora, and Karen Renaud. "Why do people adopt, or reject, smartphone password managers?." (2016)
[5] Oesch, Sean, Anuj Gautam, and Scott Ruoti. "The Emperor's New Autofill Framework: A Security Analysis of Autofill on iOS and Android." arXiv preprint
arXiv:2104.10017 (2021)
[6] Das, Anupam, et al. "The tangled web of password reuse." NDSS. Vol. 14. No. 2014. 2014
[7] Chiasson, Sonia, Paul C. van Oorschot, and Robert Biddle. "A Usability Study and Critique of Two Password Managers." USENIX Security Symposium. Vol.
15. 200
[8] Chatterjee, Rahul, et al. "Cracking-resistant password vaults using natural language encoders." 2015 IEEE Symposium on Security and Privacy. IEEE, 2015
[9] Karole, Ambarish, Nitesh Saxena, and Nicolas Christin. "A comparative usability evaluation of traditional password managers." International Conference on
Information Security and Cryptology. Springer, Berlin, Heidelberg, 2010
[10] Silver, David, et al. "Password managers: Attacks and defenses." 23rd {USENIX} Security Symposium ({USENIX} Security 14). 2014
©IJRASET: All Rights are Reserved | SJ Impact Factor 7.538 | ISRA Journal Impact Factor 7.894 | 980