Jump to content
 







Main menu
   


Navigation  



Main page
Contents
Current events
Random article
About Wikipedia
Contact us
Donate
 




Contribute  



Help
Learn to edit
Community portal
Recent changes
Upload file
 








Search  

































Create account

Log in
 









Create account
 Log in
 




Pages for logged out editors learn more  



Contributions
Talk
 



















Contents

   



(Top)
 


1 Installation  





2 Browser extensions  





3 API  





4 GUI  





5 Wallets  



5.1  Managing wallets  







6 Encryption of the password  



6.1  Blowfish symmetric block cipher algorithm  





6.2  GNU Privacy Guard encryption  







7 Security of KDE Wallet manager  





8 Known vulnerabilities  





9 Notes  





10 References  














KWallet






Deutsch
Ελληνικά
Español
Italiano
Magyar
Nederlands

Português
Русский
Türkçe
Українська
 

Edit links
 









Article
Talk
 

















Read
Edit
View history
 








Tools
   


Actions  



Read
Edit
View history
 




General  



What links here
Related changes
Upload file
Special pages
Permanent link
Page information
Cite this page
Get shortened URL
Download QR code
Wikidata item
 




Print/export  



Download as PDF
Printable version
 
















Appearance
   

 






From Wikipedia, the free encyclopedia
 


KDE Wallet Manager
Developer(s)KDE
Stable release

5.247.0[1] Edit this on Wikidata / 20 December 2023

Repositorygithub.com/KDE/kwallet
Written inMainly C++ (Qt), some C
Operating systemCross-platform
Type
  • Linux on the desktop
  • LicenseVarious LGPL[a]
    Websiteapps.kde.org/kwalletmanager5/

    KDE Wallet Manager (KWallet) is free and open-source password management software written in C++ for UNIX-style operating systems. KDE Wallet Manager runs on a Linux-based OS and Its main feature is storing encrypted passwords in KDE Wallets.[2] The main feature of KDE wallet manager (KWallet) is to collect user's credentials such as passwords or IDs and encrypt them through Blowfish symmetric block cipher algorithm or GNU Privacy Guard encryption.

    Installation[edit]

    KDE Wallet Manager (KWallet) requires a Linux-based OS and the KDE Software Compilation desktop environment such as Kubuntu.[3]

    Browser extensions[edit]

    KDE Wallet manager (KWallet) can be integrated with various web browsers including Chrome, Firefox, Opera, and Edge.

    To use KDE Wallet manager (KWallet) integration on Google Chrome or Chromium, user needs to run a program with argument --password-store=kwallet5or--password-store=detect .[4]

    A standalone add-on is also available in Firefox. This addon allows users to store passwords internally through KDE Wallet manager (KWallet) instead of the default Firefox password manager.

    Konqueror, the official web browser of the K Desktop Environment (KDE) features KDE Wallet manager (KWallet) to store sensitive passwords encrypted.

    API[edit]

    KDE Wallet Manager’s APIs trigger authentication events when the application makes a request through Desktop Communications protocol (DCOP), which is KDE’s primary interprocess communication (IPC) mechanism, which causes a password dialog box to be displayed for the application. This causes the password dialog box to be launched by the KDE daemon process. Users can choose either to cancel the dialog box which will terminate the application or to fill the password box in. If the password box is filled, the Wallet will automatically open. KDE Wallet Manager’s Desktop communications protocol (DCOP) can only be accessed locally because it is an interprocess communication (IPC) protocol that is processed over UNIX local sockets.[5]

    GUI[edit]

    On KDE Wallet Manager’s GUI, users can manage every wallet and password assigned to them.

    KDE Wallet Manager allows users to save or delete Wallets and users can identify which wallet applications should look in when attempting to access a stored password.[5]

    These are the lists of actions that users can take on the GUI of KDE Wallet manager (KWallet):

    Wallets[edit]

    Managing Wallets in KWallet.

    The Wallet is a term for password storage used in KDE Wallet Manager software. Wallets can be created manually by the user or It is offered by dialogue when the user enters in a password on any KDE desktop environment or website. Once created, Wallet can store various passwords and It is controlled by one master password. This way users do not have to remember various passwords, instead, they can just manage them by memorizing one master password for the wallet. The default Wallet is named “kdewallet” and users can create more of their own if needed.

    Managing wallets[edit]

    Users can manage wallets on their own KDE Wallet Manager window. Packaging or combining wallets can be done by dragging and dropping. If the user wants to export information to other locations such as flash drives, the window allows for the user to choose whether to export data encrypted or not. Providing the master password, the user can similarly import the data encrypted.

    Setting preference of wallets is also possible, user can set certain wallets to be the default wallet. The close wallet setting enables the user to close the wallet after:

    Encryption of the password[edit]

    The data stored by the KDE Wallet manager can be encrypted in two major ways. The GNU Privacy Guard (GnuPG or GPG) algorithm is used if GnuPG Made Easy library is installed on the user’s Linux-based OS. If not, Blowfish symmetric block cipher algorithm is used.[6]

    The encryption methods of KWallet.

    Blowfish symmetric block cipher algorithm[edit]

    KDE Wallet manager encrypts the data stored in the wallet using the Blowfish symmetric block cipher algorithm in CBC mode. To protect the user’s information, blowfish encrypted data is authenticated with the SHA-1 hashing algorithm.

    KDE Wallet manager’s blowfish encryption provides faster encryption compared to Khufu, RC5, DES, IDEA, and Trip-DES. Blowfish encrypts at a rate of 18 clock cycles per byte in 32-bit microprocessors.

    KDE Wallet manager’s Blowfish algorithm can be executed in memory within 5k, and a simple structure is easy to implement and easy to determine the strength of the algorithm. The algorithm is variable in key length, which can be long as 448 bites and it allows basic word addition and bit XOR operations.[7]

    GNU Privacy Guard encryption[edit]

    Users can create a GNU Privacy Guard (GnuPG or GPG) based wallet to store extra-sensitive passwords. This requires users to install GnuPG Made Easy library. If the library is installed and once the software found GNU Privacy Guard (GnuPG or GPG), users will be asked to choose a key to use for a new wallet.[6] User stil can encrypt passwords with Blowfish symmetric block cipher algorithm since GNU Privacy Guard encrtpytion library includes DSA/Blowfish symmetric block cipher algorithm.[8]

    Security of KDE Wallet manager[edit]

    Using KDE Wallet manager (KWallet) may ease the management of the passwords but It does not provide greater security conditions to user's system. Instead of getting user's other passwords, attackers may get the master password for user's wallets through user's PC.

    Since the directory of encrypted files of KDE wallet manager (KWallet) are located in predictable files, It might be vulnerable to viruses or worms those are programmed to aim password management system itself.[5]

    Known vulnerabilities[edit]

    Notes[edit]

    1. ^ LGPL-2.0-only, LGPL-2.0-or-later, LGPL-2.1-or-later, and LGPL-3.0-or-later.

    References[edit]

    1. ^ "v5.247.0". Retrieved 9 January 2024.
  • ^ Zhang, Jie; Luo, Xin; Akkaladevi, Somasheker; Ziegelmayer, Jennifer (2009). "Improving multiple-password recall: an empirical study". European Journal of Information Systems. 18 (2): 165–176. doi:10.1057/ejis.2009.9. ISSN 0960-085X. S2CID 7244341.
  • ^ Gray, Joshua; Franqueira, Virginia N. L.; Yu, Yijun (2016). "Forensically-Sound Analysis of Security Risks of Using Local Password Managers". 2016 IEEE 24th International Requirements Engineering Conference Workshops (REW) (PDF). Beijing, China: IEEE. pp. 114–121. doi:10.1109/REW.2016.034. ISBN 978-1-5090-3694-3. S2CID 15971740.
  • ^ Toman, Zinah Hussein; Toman, Sarah Hussein; Hazar, Manar Joundy (2019). "An In-Depth Comparison Of Software Frameworks For Developing Desktop Applications Using Web Technologies". Journal of Southwest Jiaotong University. 54 (4). doi:10.35741/issn.0258-2724.54.4.1. ISSN 0258-2724. S2CID 209057621.
  • ^ a b c d Mulligan, J.; Elbirt, A. J. (2005). "Desktop Security and Usability Trade-Offs: An Evaluation of Password Management Systems". Information Systems Security. 14 (2): 10–19. doi:10.1201/1086/45241.14.2.20050501/88289.3. ISSN 1065-898X. S2CID 21253225.
  • ^ a b Dudášová, Ludmila; Vaculík, Martin; Procházka, Jakub (2021-12-29). "Psychologický kapitál v pracovní, klinické a školní psychologii: přehledová studie". Ceskoslovenska Psychologie. 65 (6): 558–574. doi:10.51561/cspsych.65.6.558. ISSN 0009-062X. S2CID 245578091.
  • ^ Mousa, A. (2005). "Data encryption performance based on Blowfish". 47th International Symposium ELMAR, 2005. IEEE. pp. 131–134. doi:10.1109/elmar.2005.193660. ISBN 953-7044-04-1. ISSN 1334-2630. S2CID 21814142.
  • ^ Aghili, Hamed (2018-07-26), "Improving Security Using Blow Fish Algorithm on Deduplication Cloud Storage", Fundamental Research in Electrical Engineering, Lecture Notes in Electrical Engineering, vol. 480, Singapore: Springer Singapore, pp. 723–731, doi:10.1007/978-981-10-8672-4_54, ISBN 978-981-10-8671-7, S2CID 69654258, retrieved 2022-05-27
  • ^ "NVD - CVE-2005-4900". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.
  • ^ "NVD - CVE-2018-12356". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.
  • ^ "NVD - CVE-2020-25125". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.
  • ^ "NVD - CVE-2019-14855". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.
  • ^ "NVD - CVE-2013-4576". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.
  • ^ "NVD - CVE-2014-9087". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.
  • ^ "NVD - CVE-2010-2547". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.
  • ^ "NVD - CVE-2018-12020". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.
  • ^ "NVD - CVE-2005-0366". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.
  • ^ "NVD - CVE-2006-6169". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.
  • ^ "NVD - CVE-2007-1263". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.
  • ^ "NVD - CVE-2018-12020". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.
  • ^ "NVD - CVE-2016-6313". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.
  • ^ "NVD - CVE-2015-1607". nvd.nist.gov. Retrieved 2022-05-27.Public Domain This article incorporates text from this source, which is in the public domain.

  • Retrieved from "https://en.wikipedia.org/w/index.php?title=KWallet&oldid=1184728148"

    Categories: 
    Free password managers
    KDE Applications
    Hidden categories: 
    Source attribution
    Articles with short description
    Short description is different from Wikidata
     



    This page was last edited on 12 November 2023, at 07:11 (UTC).

    Text is available under the Creative Commons Attribution-ShareAlike License 4.0; additional terms may apply. By using this site, you agree to the Terms of Use and Privacy Policy. Wikipedia® is a registered trademark of the Wikimedia Foundation, Inc., a non-profit organization.



    Privacy policy

    About Wikipedia

    Disclaimers

    Contact Wikipedia

    Code of Conduct

    Developers

    Statistics

    Cookie statement

    Mobile view



    Wikimedia Foundation
    Powered by MediaWiki