Padloc: Secure ZeroTrust Password Management Architecture

Authors

  • Diksha Sakharam Waghmare
  • Srushti Sanjay Jadhav
  • Namrata Nishikant Hattargekar
  • Pooja Ravindra Wale

Keywords:

Authentication system, Cryptographic, Decryption process, Padloc, Password manager, Security

Abstract

Padlock is a modern password management application developed to Improve security of digital credentials in today’s rapidly expanding online environment. With users managing multiple accounts across platforms, traditional password storage systems often become vulnerable due to centralized data storage and server dependency. Conventional password managers rely on trusted servers to store or process sensitive information, which creates significant risks during cyberattacks or data System compromises servers may expose confidential user credentials, making centralized architectures a major security concern. To overcome these limitations, Padloc adopts a Zero-Trust security architecture, where encryption and decryption processes are performed entirely on the client side. This ensures that servers never gain access to unencrypted user data or master passwords, thereby maintaining complete user ownership and privacy. The system employs advanced cryptographic techniques to provide strong data protection. AES-GCM encryption secures stored vault data, ensuring confidentiality and integrity. RSA-based key exchange enables secure sharing of encrypted information between authorized users without exposing passwords. Additionally, PBKDF2 key derivation strengthens password-based encryption by generating secure cryptographic keys resistant to brute-force attacks. Padloc also incorporates secure authentication mechanisms that prevent sensitive credentials from being transmitted over networks. This approach reduces the risk of interception, phishing, and man-in-the-middle attacks commonly observed in traditional authentication systems. The architecture emphasizes transparency and usability alongside security. By hiding cryptographic complexity behind an intuitive interface, Padloc allows users to manage passwords efficiently without requiring technical expertise. Overall, Padloc demonstrates that strong cryptographic security, zero-knowledge storage, and user-friendly design can coexist within a single platform. The system provides a scalable, reliable solution for secure credential management while addressing modern cybersecurity challenges posed by centralized password storage.

References

S. Mare, J. Sorber, M. Shin, C. Cornelius, and D. Kotz, “Adapt-lite: Privacy-aware, secure, and efficient mHealth sensing,” in Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, 2011, pp. 137–142.

J. Blocki and A. Sridhar, “Client-cash: Protecting master passwords against offline attacks,” in Proceedings of the 11th ACM Asia Conference on Computer and Communications Security, 2016, pp. 165–176.

H. Li and D. Evans, “Horcrux: A password manager for paranoids,” arXiv preprint arXiv:1706.05085, 2017.

C. Zeidler and M. R. Asghar, “AuthStore: Password-based authentication and encrypted data storage in untrusted environments,” in Proceedings of the 17th IEEE International Conference on Trust, Security and Privacy in Computing and Communications and 12th IEEE International Conference on Big Data Science and Engineering, 2018, pp. 996–1001.

A. Karole, N. Saxena, and N. Christin, “A comparative usability evaluation of traditional password managers,” In Proceedings of the International Conference on Information Security and Cryptology, 2010, pp. 233–251.

F. Hauser, M. Schmidt, M. Häberle, and M. Menth, “P4-MACsec: Dynamic topology monitoring and data layer protection with MACsec in P4-based SDN,” IEEE Access, vol. 8, pp. 58845–58858, 2020.

D. Boneh and M. Franklin, “Identity-based encryption from the Weil pairing,” in Proceedings of the Annual International Cryptology Conference (CRYPTO), 2001, pp. 213–229.

J. Katz and Y. Lindell, Introduction to Modern Cryptography: Principles and Protocols. Boca Raton, FL, USA: Chapman & Hall/CRC, 2007.

A. Biryukov, D. Dinu, and D. Khovratovich, “Argon2: New generation of memory-hard functions for password hashing and other applications,” in Proceedings of the IEEE European Symposium on Security and Privacy, 2016, pp. 292–302.

S. Gaw and E. W. Felten, “Password management strategies for online accounts,” in Proceedings of the Second Symposium on Usable Privacy and Security, 2006, pp. 44–55.

D. Silver, S. Jana, D. Boneh, E. Chen, and C. Jackson, “Password managers: Attacks and defenses,” in Proceedings of the 23rd USENIX Security Symposium, 2014, pp. 449–464.

T. D. Wu, “The Secure Remote Password Protocol,” in Proceedings of the Network and Distributed System Security Symposium, 1998, pp. 97–111.

J. Bonneau, C. Herley, P. C. Van Oorschot, and F. Stajano, “The quest to replace passwords: A framework for comparative evaluation of web authentication schemes,” in Proceedings of the IEEE Symposium on Security and Privacy, 2012, pp. 553–567.

S. Pearson, “Taking account of privacy when designing cloud computing services,” in Proceedings of the ICSE Workshop on Software Engineering Challenges of Cloud Computing, 2009, pp. 44–52.

J. Camenisch, M. Drijvers, and A. Lehmann, “Anonymous attestation using the strong Diffie–Hellman assumption revisited,” in Proceedings of the International Conference on Trust and Trustworthy Computing, 2016, pp. 1–20.

Published

2026-03-06

Issue

Section

Articles