12
ATM Software shashwat Singh 9910103487 F3 (IV year )

Atm software

Embed Size (px)

Citation preview

Page 1: Atm software

ATM Software

shashwat Singh9910103487F3 (IV year )

Page 2: Atm software

Intoduction

• The project entitled ATM is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller.

• Using an ATM, customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances as well as purchasing mobile cell phone prepaid credit. ATMs are known by various other names including automated banking machine, money machine, bank machine, cash machine, hole-in-the-wall, cashpoint, Bancomat (in various countries in Europe and Russia), Multibanco (after a registered trade mark, in Portugal), and Any Time Money (in India) .

Page 3: Atm software

• “Online Banking " is a computerized telecommunications device that provides the customers of a financial institution with access to financial transactions in a public space without the need for a human clerk or bank teller. On most modern ATMs, the customer is identified by inserting a plastic ATM card with a magnetic stripe or a plastic smartcard with a chip, that contains a unique card number and some security information, such as an expiration date or CVC (CVV). Security is provided by the customer entering a personal identification number (PIN).

• I have inplement this by using the blow fish algorithm for encryption and decryption algorithm for security and pen drive has been use instead of ATM card .

Page 4: Atm software

The Problem Statement

The aim of proposed system is to develop a system of improved facilities. The proposed system can overcome all the limitations of the existing system. The system provides proper security and reduces the manual work.

Page 5: Atm software

PROBLEMS WITH EXISTING SYSTEM

In the existing system the transactions are done only manually but in proposed system we have to computerize all the banking transaction using the software Online Banking.

• Lack of security of data.

• More man power.

• Time consuming.

• Consumes large volume of pare work.

• Needs manual calculations.

• No direct role for the higher officials.

• Damage of machines due to lack of attention.

Page 6: Atm software

Blowfish Encryption Algorithm

Blowfish was designed in 1993 by Bruce Scheier as a fast, alternative to existing encryption algorithms such AES, DES and 3 DES etc.Blowfish is a symmetric block encryption algorithm designed in consideration with,• Fast : It encrypts data on large 32-bit microprocessors at a rate of 26 clock

cycles per byte.• Compact: It can run in less than 5K of memory.• Simple: It uses addition, XOR, lookup table with 32-bit operands.• Secure: The key length is variable ,it can be in the range of 32~448 bits:

default 128 bits key length.It is suitable for applications where the key does not change often, like communication link or an automatic file encryptor.

Page 7: Atm software

Description Of Algorithm

Blowfish symmetric block cipher algorithm encrypts block data of 64-bits at a time.it will follows the feistel network and this algorithm is divided into two parts.

1. Key-expansion

2. Data Encryption

Page 8: Atm software

Algorithm

Divide x into two 32-bit halves: xL, xR

For i = 1to 16:

xL = XL XOR Pi

xR = F(XL) XOR xR

Swap XL and xR

Swap XL and xR (Undo the last swap.)

xR = xR XOR P17

xL = xL XOR P18

Recombine xL and xR

Page 9: Atm software

Conclusion

Using “ATM" , customers can access their bank accounts in order to make cash withdrawals (or credit card cash advances) and check their account balances as well as purchasing mobile cell phone prepaid creditThe system is very simple in design and to implement. The system requires very low system resources and the system will work in almost all configurations. It has got following features

• Security of data.

• Ensure data accuracy’s.

• Proper control of the higher officials.

• Reduce the damages of the machines.

• Minimize manual data entry.

• Minimum time needed for the various processing.

• Greater efficiency.

• Better service.

Page 10: Atm software

Future Scope

Keeping the problem in mind, we have developed a solution which would help the bank, achieve its overall objectives. The application can be securely accessed by bank employees & the administrator who has got system-level rights to access confidential information of the bank employees in the database.

• Face recognize

• Research and thinking of the software base

• protecting ATM Fraud and security

• Facial verification technology

Page 11: Atm software

References

• Schneier, Bruce. "Description of a New Variable-Length Key, 64-Bit Block Cipher(Blowfish " Blowfish Paper. 1993. Web. 18 Mar. 2012. " <http://www.schneier.com/paper-blowfish-fse.html>.

• Morgan, Mike. "Blowfish Bug." Schneier on Security. 8 July 1996. Web. 18 Mar. 2012.

" <http://www.schneier.com/blowfish-bug.txt>.

• Schneier, Bruce. "The Blowfish Encryption Algorithm" Blowfish. 1993. Web. 18 Mar. 2012.

" <http://www.schneier.com/blowfish.html>.

• "Standard Cryptographic Algorithm Naming." Zetnet Meta Refresh. Web. 18 Mar. 2012.

" <http://www.users.zetnet.co.uk/hopwood/crypto/scan/cs.html>.

• R.Amsterdam,. M.J.Leuven, J.Leuen, M.Louvain-la-Neuve.,ModernActuarial Risk Theory.,Kluwer Academic Publishers.,2001:15~84

Page 12: Atm software

Thank You