Visual Password 作者: Denis Tulupov
A generator for strong and secure passwords using simple actions that are easy to remember and don't need to be written down.
尚无用户尚无用户
扩展元数据
屏幕截图
关于此扩展
A generator for strong and secure passwords using simple actions that are easy to remember and don’t need to be written down. This makes your passwords 100% secure because they cannot be stolen.
Don’t store your passwords in a password manager, notes, or on paper. Simply memorize a few emojis and a keyword to instantly recover a complex password when needed.
Visual Password generates passwords entirely locally on your device. No internet connection required. It does not store any generated passwords.
To create passwords, Visual Password uses a multi-layered cryptographic password-generation algorithm that takes your input data (keyword, PIN, visual password). It applies multi-stage AES-GCM encryption, bit mixing for maximum entropy, and multi-stage SHA-256 hashing for cryptographic strength. PBKDF2 key derivation protects against rainbow-table attacks and adds computational complexity beyond the reach of modern supercomputers. Multiple cascade-encryption layers enhance overall resilience and provide cryptographic redundancy. The final step uses a high-entropy pseudorandom generator based on cryptographically secure data, ensuring the uniqueness and complexity of the password even with very similar inputs.
Don’t store your passwords in a password manager, notes, or on paper. Simply memorize a few emojis and a keyword to instantly recover a complex password when needed.
Visual Password generates passwords entirely locally on your device. No internet connection required. It does not store any generated passwords.
To create passwords, Visual Password uses a multi-layered cryptographic password-generation algorithm that takes your input data (keyword, PIN, visual password). It applies multi-stage AES-GCM encryption, bit mixing for maximum entropy, and multi-stage SHA-256 hashing for cryptographic strength. PBKDF2 key derivation protects against rainbow-table attacks and adds computational complexity beyond the reach of modern supercomputers. Multiple cascade-encryption layers enhance overall resilience and provide cryptographic redundancy. The final step uses a high-entropy pseudorandom generator based on cryptographically secure data, ensuring the uniqueness and complexity of the password even with very similar inputs.
评分 0(1 位用户)
权限与数据
更多信息
- 附加组件链接
- 版本
- 1.2.0
- 大小
- 25.84 KB
- 上次更新
- 9 个月前 (2025年8月16日)
- 相关分类
- 许可证
- 保留所有权利
- 版本历史
- 添加到收藏集