Atm software

Preview:

Citation preview

ATM Software

shashwat Singh9910103487F3 (IV year )

Intoduction

• The project entitled ATM is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller.

• Using an ATM, customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances as well as purchasing mobile cell phone prepaid credit. ATMs are known by various other names including automated banking machine, money machine, bank machine, cash machine, hole-in-the-wall, cashpoint, Bancomat (in various countries in Europe and Russia), Multibanco (after a registered trade mark, in Portugal), and Any Time Money (in India) .

• “Online Banking " is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller. On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique card number and some security information, such as an expiration date or CVC (CVV). Security is provided by the customer entering a personal identification number (PIN).

• I have inplement this by using the blow fish algorithm for encryption and decryption algorithm for security and pen drive has been use instead of ATM card .

The Problem Statement

The aim of proposed system is to develop a system of improved facilities. The proposed system can overcome all the limitations of the existing system. The system provides proper security and reduces the manual work.

PROBLEMS WITH EXISTING SYSTEM

In the existing system the transactions are done only manually but in proposed system we have to computerize all the banking transaction using the software Online Banking.

• Lack of security of data.

• More man power.

• Time consuming.

• Consumes large volume of pare work.

• Needs manual calculations.

• No direct role for the higher officials.

• Damage of machines due to lack of attention.

Blowfish Encryption Algorithm

Blowfish was designed in 1993 by Bruce Scheier as a fast, alternative to existing encryption algorithms such AES, DES and 3 DES etc.Blowfish is a symmetric block encryption algorithm designed in consideration with,• Fast : It encrypts data on large 32-bit microprocessors at a rate of 26 clock

cycles per byte.• Compact: It can run in less than 5K of memory.• Simple: It uses addition, XOR, lookup table with 32-bit operands.• Secure: The key length is variable ,it can be in the range of 32~448 bits:

default 128 bits key length.It is suitable for applications where the key does not change often, like communication link or an automatic file encryptor.

Description Of Algorithm

Blowfish symmetric block cipher algorithm encrypts block data of 64-bits at a time.it will follows the feistel network and this algorithm is divided into two parts.

1. Key-expansion

2. Data Encryption

Algorithm

Divide x into two 32-bit halves: xL, xR

For i = 1to 16:

xL = XL XOR Pi

xR = F(XL) XOR xR

Swap XL and xR

Swap XL and xR (Undo the last swap.)

xR = xR XOR P17

xL = xL XOR P18

Recombine xL and xR

Conclusion

Using “ATM" , customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances as well as purchasing mobile cell phone prepaid creditThe system is very simple in design and to implement. The system requires very low system resources and the system will work in almost all configurations. It has got following features

• Security of data.

• Ensure data accuracy’s.

• Proper control of the higher officials.

• Reduce the damages of the machines.

• Minimize manual data entry.

• Minimum time needed for the various processing.

• Greater efficiency.

• Better service.

Future Scope

Keeping the problem in mind, we have developed a solution which would help the bank, achieve its overall objectives. The application can be securely accessed by bank employees & the administrator who has got system-level rights to access confidential information of the bank employees in the database.

• Face recognize

• Research and thinking of the software base

• protecting ATM Fraud and security

• Facial verification technology

References

• Schneier, Bruce. "Description of a New Variable-Length Key, 64-Bit Block Cipher(Blowfish " Blowfish Paper. 1993. Web. 18 Mar. 2012. " <http://www.schneier.com/paper-blowfish-fse.html>.

• Morgan, Mike. "Blowfish Bug." Schneier on Security. 8 July 1996. Web. 18 Mar. 2012.

" <http://www.schneier.com/blowfish-bug.txt>.

• Schneier, Bruce. "The Blowfish Encryption Algorithm" Blowfish. 1993. Web. 18 Mar. 2012.

" <http://www.schneier.com/blowfish.html>.

• "Standard Cryptographic Algorithm Naming." Zetnet Meta Refresh. Web. 18 Mar. 2012.

" <http://www.users.zetnet.co.uk/hopwood/crypto/scan/cs.html>.

• R.Amsterdam,. M.J.Leuven, J.Leuen, M.Louvain-la-Neuve.,ModernActuarial Risk Theory.,Kluwer Academic Publishers.,2001:15~84

Thank You

Recommended