Thanks to visit codestin.com
Credit goes to www.scribd.com

0% found this document useful (0 votes)
7 views40 pages

Proper Baking System With Secure Transaction

Uploaded by

Sameer Bhandari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
7 views40 pages

Proper Baking System With Secure Transaction

Uploaded by

Sameer Bhandari
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 40

Proper Banking System with

Secure Transaction

0
Acknowledgement:

The online banking system in PHP is a system which can be used to create an online
banking website. This online banking system has so many features a normal bank
system should have and even more.

This system focuses more on making financial transaction like deposing withdrawals
and making of transfer to other account registered on the platform. The system has
a lot of features which can be done by the admin or staff when they login.

1
ABSTRACT:

In today's digital age, secure online transactions are crucial for maintaining the
confidentiality, integrity, and authenticity of sensitive data. This project presents a
Secure Online Transaction System developed in Java, utilizing MySQL as the
database management system, and employing the AES (Advanced Encryption
Standard) algorithm for encryption purposes. The objective of this project was to
design and implement a robust system that ensures secure online transactions,
safeguarding against unauthorized access, data breaches, and fraudulent activities.
To achieve this, the project leveraged the AES algorithm, a widely adopted
symmetric encryption algorithm known for its high level of security and
performance. The system architecture includes a client-server model, where the
clients are responsible for initiating and executing transactions, while the server
manages the transaction requests and interacts with the MySQL database. The Java
programming language was used to develop the client and server components,
facilitating platform independence and ease of deployment. To secure the sensitive
transaction data during transmission and storage, the AES algorithm was
implemented. The AES algorithm operates on 128-bit blocks and supports key
lengths of 128, 192, and 256 bits. It provides robust encryption and decryption
functions, ensuring that the data remains confidential and tamper-proof. The keys
used in the AES algorithm were securely generated and managed within the system.
The MySQL database was employed to store transaction-related information, user
credentials, and other relevant data. The integration of MySQL allowed for efficient
data management and retrieval, with appropriate security measures implemented
to protect against SQL injection attacks and unauthorized database access. The

2
implemented Secure Online Transaction System with Cryptography successfully
provides a secure environment for users to conduct online transactions. The
utilization of the AES algorithm ensures the confidentiality and integrity of the
transaction data, protecting it from unauthorized access and tampering. The
system's integration with MySQL enables efficient and reliable data management,
further enhancing the overall user experience. The outcomes of this project
contribute to the field of secure online transactions by demonstrating the successful
implementation of cryptography techniques using the AES algorithm. The
developed system serves as a practical example of how Java, MySQL, and AES can
be combined to create a robust and secure online transaction platform. The
project's findings can benefit individuals, businesses, and financial institutions by
providing them with a secure framework for conducting online transactions and
protecting sensitive information.

3
Table of contents

1 INTRODUCTION (6-10)

1.1-> Working conditions and basic needs in the secure computing

1.2-> Benefits of secure computing

2 LITERATURE SURVE (11-13)


2.1-> Design and Analysis of Digital True Random Number Generator

2.2-> An Analysis of Identity Theft: Motives, Related Frauds, Techniques and

Prevention.

2.3-> Combine use of steganography and visual cryptography for online payment
system
2.4-> Study of Hidden Markov Model in Credit Card Fraudulent Detection

3 Requirements (14)
4 Existing System (15-21)

4.1-> Disadvantage of Existing System

4.2-> Proposed System

4.3-> Advantage of Proposed System

5 System Architecture (22)

6 Implementation (23-24)

6.1-> Admin

6.2-> Staff

6.3-> Users

4
6.4-> AES Algorithm Module

7 Module Description (25-29)

7.1 Admin module

7.2 Staff Module

7.3 Client Module

8 System Testing (30-33)

8.1-> Unit Testing

8.2-> Integration Testing

8.3-> Functional Testing

8.4-> System Testing

8.5-> White Box Testing

8.6-> Black Box Testing

8 Conclusion (34-37)

9 References (38-39)

5
INTRODUCTION
What is Secure Computing?

Computer security (Also known as cyber security or IT Security) is information


security as applied to computers and networks. The field covers all the processes
and mechanisms by which computer-based equipment, information and services
are protected from unintended or unauthorized access, change or destruction.
Computer security also includes protection from unplanned events and natural
disasters. Otherwise, in the computer industry, the term security -- or the phrase
computer security -- refers to techniques for ensuring that data stored in a
computer cannot be read or compromised by any individuals without authorization.
Most computer security measures involve data encryption and passwords. Data
encryption is the translation of data into a form that is unintelligible without a
deciphering mechanism. A password is a secret word or phrase that gives a user
access to a particular program or system.

Diagram clearly explain the about the secure computing

6
Working conditions and basic needs in the secure computing:

If you don't take basic steps to protect your work computer, you put it and all the
information on it at risk. You can potentially compromise the operation of other
computers on your organization's network, or even the functioning of the network
as a whole.

1. Physical security:
Technical measures like login passwords, anti-virus are essential. (More about those
below) However, a secure physical space is the first and more important line of
defense.

Is the place you keep your workplace computer secure enough to prevent theft or
access to it while you are away? While the Security Department provides coverage
across the Medical center, it only takes seconds to steal a computer, particularly a
portable device like a laptop or a PDA. A computer should be secured like any other
valuable possession when you are not present.

Human threats are not the only concern. Computers can be compromised by
environmental mishaps (e.g., water, coffee) or physical trauma. Make sure the
physical location of your computer takes account of those risks as well.

2. Access passwords:

The University's networks and shared information systems are protected in part by
login credentials (user-IDs and passwords). Access passwords are also an essential
protection for personal computers in most circumstances. Offices are usually open
and shared spaces, so physical access to computers cannot be completely

7
controlled. To protect your computer, you should consider setting passwords for
particularly sensitive applications resident on the computer (e.g., data analysis
software), if the software provides that capability.

3. Prying eye protection:

Because we deal with all facets of clinical, research, educational and administrative
data here on the medical campus, it is important to do everything possible to
minimize exposure of data to unauthorized individuals.

4. Anti-virus software:

Up-to-date, properly configured anti-virus software is essential. While we have


server-side anti-virus software on our network computers, you still need it on the
client side (your computer).

5. Firewalls:

Anti-virus products inspect files on your computer and in email. Firewall software
and hardware monitor communications between your computer and the outside
world. That is essential for any networked computer.

6. Software updates:

It is critical to keep software up to date, especially the operating system, anti-virus


and anti-spyware, email and browser software. The newest versions will contain
fixes for discovered vulnerabilities.

8
Almost all anti-virus have automatic update features (including SAV). Keeping the
"signatures" (digital patterns) of malicious software detectors up-to-date is
essential for these products to be effective.

7. Keep secure backups:

Even if you take all these security steps, bad things can still happen. Be prepared
for the worst by making backup copies of critical data, and keeping those backup
copies in a separate, secure location. For example, use supplemental hard drives,
CDs/DVDs, or flash drives to store critical, hard-to-replace data.

8. Report problems:

If you believe that your computer or any data on it has been compromised, your
should make a information security incident report. That is required by University
policy for all data on our systems, and legally required for health, education,
financial and any other kind of record containing identifiable personal information.

Benefits of secure computing:

• Protect yourself - Civil liability:


You may be held legally liable to compensate a third party should they
experience financial damage or distress as a result of their personal data being
stolen from you or leaked by you.

• Protect your credibility - Compliance:

9
You may require compliancy with the Data Protection Act, the FSA, SOX or
other regulatory standards. Each of these bodies stipulates that certain
measures be taken to protect the data on your network.
• Protect your reputation - Spam:
A common use for infected systems is to join them to a botnet (a collection of
infected machines which takes orders from a command server) and use them
to send out spam. This spam can be traced back to you, your server could be
blacklisted and you could be unable to send email.

• Protect your income - Competitive advantage:

There are a number of “hackers-for-hire” advertising their services on the


internet selling their skills in breaking into company’s servers to steal client
databases, proprietary software, merger and acquisition information, personal
details.

• Protect your business - Blackmail:

A seldom-reported source of income for “hackers” is to·break into your server,


change all your passwords and lock you out of it. The password is then sold
back to you. Note: the “hackers” may implant a backdoor program on your
server so that they can repeat the exercise at will.

• Protect your investment - Free storage:


Your server’s harddrive space is used (or sold on) to house the hacker's video
clips, music collections, pirated software or worse. Your server or computer
then becomes continuously slow and your internet connection speeds
deteriorate due to the number of people connecting to your server in order to
download the offered wares.

10
LITERATURE SURVEY

1) Design and Analysis of Digital True Random Number Generator

Random number generator is a key component for strengthening and securing the
confidentiality of electronic communications. Random number generators can be
divided as either pseudo random number generators or true random number
generators. A pseudo random number generator produces a stream of numbers
that appears to be random but actually follow predefined sequence. A true random
number generator produces a stream of unpredictable numbers that have no
defined pattern. There has been growing interest to design true random number
generator in past few years. Several Field Programmable Gate Array (FPGA) and
Application Specific Integrated Circuit (ASIC) based approaches have been used to
generate random data that requires analog circuit. RNGs having analog circuits
demand for more power and area. These factors weaken hardware analog
circuitbased RNG systems relative to hardware completely digital-based RNGs
systems. This thesis is focused on the design of completely digital true random
number generator ASIC.

2) An Analysis of Identity Theft: Motives, Related Frauds, Techniques and


Prevention

This paper is a conceptual review of the major crimes leading to ID fraud and losses
of millions of dollars for business and people in the world every year. The paper
provides a review of the unique effective techniques for sustainable development
of prevention methods that have been offered to people and business. In addition,
the paper reviews literature and summarizes the most effective ways for people and
11
business to protect them against ID theft because victims may face a lengthy
process of cleaning up the damage, such as their reputation, credit rating, and jobs.
Identity (ID) theft is unauthorized obtaining of others confidential information in
order to misuse it. ID theft is one of the major problems that impose billions of
dollars annually on people and businesses across the globe. In 2008 only, 9.9
millions of Americans were victimized which show 22% increase compared to 2007.
Analyzing four major factors - political, economic, social, and technological- reveals
that social and technological factors are the significant origins of ID theft. Social
engineering is a technique for thieves by which social engineers take advantage of
people’s behaviors in social networks such as Facebook to steal individuals’ key
information. This report examines different types of frauds that are the major
outcomes of ID theft. The frauds as the results of ID theft comprise ID fraud,
financial fraud, tax fraud, medical fraud, resume fraud, mortgage fraud, and
organized crimes such as money laundering, terrorism, and illegal immigration.
Moreover, the various techniques that thieves use to attack individuals and
organizations are discussed. The different techniques are divided to two major
ones, physical and technological. Physical techniques include several traditional
ways such as mail theft and insider theft. It is crucial for organizations’ managers to
know that despite new technology-based techniques, more than 70% of ID theft
occurs by insiders. In addition, it will be shown how thieves apply both technology-
based techniques such as phishing and social engineering to steal personal
information. Finally several effective prevention techniques will be provided for
individuals and organization to protect key data and information against identity
theft. Usually, thieves attempt to bypass security systems through human elements.

12
Therefore, the recommendation significantly emphasizes developing individuals’
awareness through public and organizational training.

3) Combine use of steganography and visual cryptography for online payment


system
A rapid growth in the E - Commerce market is seen in recent time in the whole
extent of the world. With ever increasing popularity of online shopping,
Debit/Credit card fraud and personal information security are major concerns for
clients, Merchandiser and depository financial institution specifically in the case of
CNP (Card Not Present). This paper presents a novel approach for providing limited
information that is necessary for fund transfer during online shopping thereby
safeguarding customer data and increasing customer confidence and preventing
identity stealing. This method uses combined application of Steganography and
visual cryptography for this purpose.

4) Study of Hidden Markov Model in Credit Card Fraudulent Detection


The most accepted payment mode is credit card for both online and offline in
today's world, it provides cashless shopping at every shop in all countries. It will be
the most convenient way to do online shopping, paying bills etc. Hence, risks of
fraud transaction using credit card has also been increasing. In the existing credit
card fraud detection business processing system, fraudulent transaction will be
detected after transaction is done. It is difficult to find out fraudulent and regarding
loses will be barred by issuing authorities. Hidden Markov Model is the statistical
tools for engineer and scientists to solve various problems. In this paper, it is shown
that credit card fraud can be detected using Hidden Markov Model during
13
transactions. Hidden Markov Model helps to obtain a high fraud coverage combined
with a low false alarm rate.

SYSTEM REQUIREMENTS:

HARDWARE REQUIREMENTS:

➢ System : Pentium i3 Processor


➢ Hard Disk : 500 GB.
➢ Monitor : 15’’ LED
➢ Input Devices : Keyboard, Mouse
➢ Ram : 4 GB

SOFTWARE REQUIREMENTS:

➢ Operating system : Windows 10,11.


➢ Coding Language : HTML,CSS,JAVA
SCRIPT,PHP.
➢ Tool : XAMPP SEVER
➢ Database : MYSQL

14
EXISTING SYSTEM:

 The existing online transaction systems often suffer from several


vulnerabilities that pose risks to users' sensitive data. One of the primary
concerns is the lack of robust encryption mechanisms, leading to potential
data breaches during transmission and storage. Without encryption, data can
be intercepted and compromised, jeopardizing the confidentiality of
transaction details and user information.
 The existing system is also another weakness which lies in the authentication
mechanisms employed by the earlier systems. Many systems rely solely on
passwords for user authentication, which can be easily exploited through
password guessing, brute-force attacks, or social engineering techniques.
Such vulnerabilities increase the likelihood of unauthorized access to user
accounts, enabling fraudulent activities and compromising the integrity of
transactions.
 Furthermore, the earlier systems often lack secure communication protocols.
Without proper implementation of protocols like SSL or TLS, there is a higher
risk of man-in-the-middle attacks, where attackers intercept and manipulate
data exchanged between the client and the server. This vulnerability can
result in unauthorized modifications to transaction details, leading to
financial losses and a loss of trust in the system.

15
DISADVANTAGES OF EXISTING SYSTEM:

 Inadequate Encryption: The existing system lacks robust encryption


mechanisms, leaving sensitive transaction data vulnerable to interception
and unauthorized access. This deficiency increases the risk of data breaches
and compromises the confidentiality of user information.
 Weak Authentication: Many earlier systems rely solely on passwords for user
authentication, which can be easily compromised. Password guessing, brute-
force attacks, and social engineering techniques can lead to unauthorized
access and fraudulent activities, compromising the integrity of transactions.
 Absence of Secure Communication Protocols: Without the implementation
of secure communication protocols like SSL or TLS, the existing system is
susceptible to man-in-the-middle attacks. Attackers can intercept and
manipulate data exchanged between the client and server, leading to
unauthorized modifications and potential financial losses.
 Insufficient Data Validation: The existing system often lacks comprehensive
data validation mechanisms, making it vulnerable to code injection attacks
such as SQL injection or cross-site scripting (XSS). These vulnerabilities allow
attackers to manipulate system behavior, gain unauthorized access, and
compromise the integrity of stored data.
 Lack of Timely Incident Response: Due to inadequate security measures, the
existing system may experience delays in detecting and responding to
security incidents. This delay can exacerbate the impact of breaches and
result in prolonged exposure to potential threats.

16
 Vulnerability to Social Engineering: The existing system may be susceptible to
social engineering attacks, where attackers manipulate users into divulging
sensitive information or performing unauthorized actions. This vulnerability
undermines the security of online transactions and compromises user trust.
 Limited Scalability and Performance: Some earlier systems may lack
scalability and suffer from performance issues, especially during peak
transaction periods. This limitation can lead to slow response times,
transaction failures, and an overall poor user experience.
 Regulatory Compliance Challenges: Inadequate security measures in the
existing system may pose challenges in meeting regulatory compliance
requirements, such as the Payment Card Industry Data Security Standard (PCI
DSS) or General Data Protection Regulation (GDPR). This deficiency can result
in legal consequences and reputational damage.
 Lack of User Awareness: The existing system may not prioritize user
education and awareness regarding online transaction security. Users may
not be adequately informed about best practices, potential risks, or how to
identify and report suspicious activities, increasing the likelihood of falling
victim to scams or fraudulent transactions.

Understanding these disadvantages highlights the need for improved security


measures, such as the incorporation of robust encryption, secure authentication
mechanisms, secure communication protocols, comprehensive data validation,
auditing and logging capabilities, timely incident response procedures, and user
education initiatives. Overcoming these challenges can lead to the development of
a more secure and reliable online transaction system.

17
PROPOSED SYSTEM:

 The proposed system aims to address the limitations of the existing online
transaction systems by introducing enhanced security measures and
leveraging cryptography techniques. This system ensures secure online
transactions with improved data confidentiality, integrity, and
authentication. The proposed system incorporates the AES (Advanced
Encryption Standard) algorithm, a widely recognized and secure symmetric
encryption algorithm. AES ensures the confidentiality of transaction data
during transmission and storage, protecting it from unauthorized access and
data breaches.
 The proposed system integrates with a MySQL database management system
to efficiently store and manage transaction-related information and user
credentials. Secure practices are implemented to protect against SQL
injection attacks and unauthorized access to the database. The system is
designed to optimize performance and scalability, ensuring smooth and
reliable transaction processing even during peak periods. Efficient algorithms
and database optimization techniques are employed to enhance system
responsiveness.
 The proposed system offers a secure environment for users to conduct online
transactions. It instills confidence by protecting sensitive data, enhancing the
integrity of transactions, and mitigating the risks associated with
unauthorized access and fraudulent activities. The proposed system's
implementation and evaluation involve rigorous testing and validation
procedures to ensure its effectiveness, performance, and resistance to

18
potential attacks. The findings from this project contribute to the
development of secure online transaction systems and cryptography
research, paving the way for future advancements in online transaction
security.

ADVANTAGES OF PROPOSED SYSTEM:

 Enhanced Data Confidentiality: The proposed system utilizes robust


encryption techniques, such as the AES algorithm, ensuring the
confidentiality of transaction data. This significantly reduces the risk of
unauthorized access and data breaches, protecting sensitive information and
enhancing user privacy.
 Improved Data Integrity: With the implementation of secure communication
protocols and comprehensive data validation mechanisms, the proposed
system safeguards the integrity of transaction data. This mitigates the risk of
unauthorized modifications or tampering, ensuring the accuracy and
trustworthiness of the transaction records.
 Strong Authentication Mechanisms: The integration of secure authentication
mechanisms enhances the system's defense against unauthorized access.
This ensures that only authorized users can initiate and execute transactions,
reducing the risk of fraudulent activities.
 Robust Protection against Attacks: By employing secure communication
protocols, the proposed system effectively safeguards against man-in-
themiddle attacks. It establishes encrypted and authenticated channels,
preventing attackers from intercepting and manipulating transaction data.
19
 Efficient Database Management: Integration with the MySQL database
management system facilitates efficient storage and retrieval of
transactionrelated information. Secure practices are implemented to protect
against SQL injection attacks and unauthorized access, ensuring the integrity
and availability of the data.
 User-Friendly Interface: The proposed system prioritizes user experience,
offering a user-friendly interface that simplifies the transaction process. This
enhances user engagement and satisfaction, promoting the adoption of
secure online transactions.
 Scalability and Performance Optimization: The system is designed to optimize
performance and scalability, ensuring smooth transaction processing even
during peak periods. Efficient algorithms and database optimization
techniques are employed to maintain high system responsiveness and
accommodate increasing transaction volumes.
 Trust and Confidence: The implementation of strong security measures,
cryptography techniques, and user education initiatives instills trust and
confidence among users. This encourages increased adoption of the
proposed system and promotes secure online transactions.
 Future-Proofing and Research Opportunities: By incorporating advanced
security measures and cryptography techniques, the proposed system sets
the stage for future research and development in online transaction security.
It establishes a foundation for exploring emerging technologies and
addressing evolving security challenges.

20
The advantages of the proposed system contribute to a secure and trustworthy
online transaction environment. Users can confidently engage in online
transactions, knowing that their data is protected, transactions are reliable, and
risks of unauthorized access and fraud are mitigated.

21
SYSTEM ARCHITECTURE:

22
IMPLEMENTATION

MODULES:

Admin:

 Activate Users
 Create Account details for users
 Reject Applications
 View Rejected applications
 View Active Use
 View transaction
 Create staff
 Delete staff

Staff:

 Activate Users
 Create Account details for users
 Reject Applications
 View Rejected applications
 View Active Use
 View transaction

Users:

 Account Register
 Login with Credentials

23
 Update Pin Number

 Deposits Money
 Update Pin Number
 Withdraw Money
 Transfer Money

AES Algorithm Module:

• Encryption
• Decryption

24
MODULES DESCSRIPTION:

Admin Module:

This module facilitates the processing of online transactions securely. It handles


functionalities such as transaction initiation, verification, and authorization. It
ensures the confidentiality and integrity of transaction data throughout the
process.
In this module, Admin will activate the users’ accounts by viewing all the details
given by the users. After verifying the details only admin activate the account. After
activation a unique account number will be generated for each user accounts.
Admin can view the rejected and active users details. Admin can view all the
transactions made by the users. Admin can also view the complaints made by the
users.

Activate Users:

This sub-module allows the administrator to activate user accounts after reviewing
their applications. It validates user information and grants access to the system.

Create Account details for users:

This sub-module enables the administrator to create and manage account details
for users. It involves assigning unique identifiers, setting up user profiles, and
ensuring accurate information.

Reject Applications:

25
This sub-module allows the administrator to reject user applications that do not
meet the system's criteria or have insufficient information. It provides feedback to
the rejected applicants.

View Rejected applications:

This sub-module enables the administrator to view a list of rejected user


applications for reference or further review.

View Active Users:

This sub-module allows the administrator to view a list of active users currently
using the system. It provides an overview of user accounts and their status.

View Transactions:

This sub-module provides the administrator with access to view transaction details,
including the sender, recipient, transaction amount, and timestamp.

View Complaints:

This sub-module allows the administrator to view and address user complaints.

Staff Module:

Just like the admin the staff has its own dashboard which shows all transaction
analytics, number of clients, and other finance reports.

The staff can only login using the details create by the admin for the particular staff.
The staff can manage the clients and transaction done on the platform only. They

26
can update client’ details, delete clients. The staff can also see the transaction
history; they can also print the deposit, withdrawal or transfer history just like the
admin does.

The staff can deposit into any account or withdraw from any account. They can also
make transfer from one account to other or roll back wrong transactions. The staff
can also make balance enquiry on any single account create on the system with
every single transaction made on the account; this page can be printed using print
button.

Users Module:

This module provides a user-friendly interface for users to interact with the system.
It includes functionalities such as displaying transaction details, managing user
settings, and providing feedback to users regarding the status of their transactions.
User’s first register all the details requested in the account activation form after
filling the form user have to submit. User will get a unique account number after
activating the account. Users can perform the deposits, withdraw, transfer money
to another accounts. User can view all the transactions and also if any complaint
needs the register then users can raise the complaints. All the details shown to users
are End to End Encryptions.

Account Register:

27
This sub-module enables users to create an account by providing necessary
personal information. It validates user inputs, checks for duplicate accounts, and
generates unique account identifiers.

Login with Credentials:

This sub-module allows users to log into the system securely using their
credentials, such as username and password. It verifies the user's identity and
grants access to their account.

Update Pin Number:

This sub-module allows users to update their PIN (Personal Identification Number)
for added security. It ensures that only the authorized user can access the account.

Deposits Money:

This sub-module allows users to deposit money into their account. It verifies the
transaction, updates the account balance, and generates a receipt for confirmation.

Withdraw Money:

This sub-module enables users to withdraw money from their account. It validates
the transaction, deducts the requested amount from the account balance, and
generates a receipt for record-keeping.

Transfer Money:

This sub-module facilitates money transfers between user accounts. It verifies the
sender's account balance, deducts the transferred amount, updates the recipient's
account balance, and generates transaction records.

28
AES Algorithm Module:

This module is responsible for encrypting and decrypting transaction data using
robust encryption algorithms such as AES. It ensures that sensitive information
remains confidential during transmission and storage, protecting it from
unauthorized access.

Encryption:

This sub-module implements the AES (Advanced Encryption Standard) algorithm to


encrypt sensitive data. It takes the plaintext data and encryption key as input and
generates encrypted ciphertext, ensuring data confidentiality during transmission
and storage.

Decryption:

This sub-module performs the decryption process using the AES algorithm. It takes
the encrypted ciphertext and the decryption key as input and produces the original
plaintext data, allowing authorized users to access and interpret the information
securely.

29
SYSTEM TESTING

The purpose of testing is to discover errors. Testing is the process of trying to


discover every conceivable fault or weakness in a work product. It provides a way
to check the functionality of components, sub- assemblies, assemblies and/or a
finished product It is the process of exercising software with the intent of ensuring
that the Software system meets its requirements and user expectations and does
not fail in an unacceptable manner. There are various types of test. Each test type
addresses a specific testing requirement.

TYPES OF TESTS

(a). Unit testing :Unit testing involves the design of test cases that validate that the
internal program logic is functioning properly, and that program inputs produce
valid outputs. All decision branches and internal code flow should be validated. It is
the testing of individual software units of the application .it is done after the
completion of an individual unit before integration. This is a structural testing, that
relies on knowledge of its construction and is invasive. Unit tests perform basic tests
at component level and test a specific business process, application, and/or system
configuration. Unit tests ensure that each unique path of a business process
performs accurately to the documented specifications and contains clearly defined
inputs and expected results.

(b). Integration testing :Integration tests are designed to test integrated software
components to determine if they actually run as one program. Testing is event
driven and is more concerned with the basic outcome of screens or fields.

30
Integration tests demonstrate that although the components were individually
satisfaction, as shown by successfully unit testing, the combination of components
is correct and consistent. Integration testing is specifically aimed at exposing the
problems that arise from the combination of components.

(c). Functional test :Functional tests provide systematic demonstrations that


functions tested are available as specified by the business and technical
requirements, system documentation, and user manuals.
Functional testing is centered on the following items:

Valid Input : identified classes of valid input must be accepted.

Invalid Input : identified classes of invalid input must be rejected.

Functions : identified functions must be exercised.


Output : identified classes of application outputs must be exercised.

Systems/Procedures: interfacing systems or procedures must be invoked.

Organization and preparation of functional tests is focused on requirements, key


functions, or special test cases. In addition, systematic coverage pertaining to
identify Business process flows; data fields, predefined processes, and successive
processes must be considered for testing. Before functional testing is complete,
additional tests are identified and the effective value of current tests is determined.

(d). System testing :System testing ensures that the entire integrated software
system meets requirements. It tests a configuration to ensure known and

31
predictable results. An example of system testing is the configuration oriented
system integration test. System testing is based on process descriptions and flows,
emphasizing pre-driven process links and integration points

(e). White Box Testing :White Box Testing is a testing in which in which the
software tester has knowledge of the inner workings, structure and language of the
software, or at least its purpose. It is purpose. It is used to test areas that cannot be
reached from a black box level.

(f). Black Box Testing :Black Box Testing is testing the software without any
knowledge of the inner workings, structure or language of the module being tested.
Black box tests, as most other kinds of tests, must be written from a definitive
source document, such as specification or requirements document, such as
specification or requirements document. It is a testing in which the software under
test is treated, as a black box
. You cannot “see” into it. The test provides inputs and responds to outputs without
considering how the software works.

(g). Unit Testing :Unit testing is usually conducted as part of a combined code and
unit test phase of the software lifecycle, although it is not uncommon for coding
and unit testing to be conducted as two distinct phases.

Test strategy and approach

Field testing will be performed manually and functional tests will be written in
detail.

1. Test objectives

32
• All field entries must work properly.

• Pages must be activated from the identified link.

• The entry screen, messages and responses must not be delayed.

2. Features to be tested

• Verify that the entries are of the correct format

• No duplicate entries should be allowed

• All links should take the user to the correct page.

(h). Integration Testing :Software integration testing is the incremental


integration testing of two or more integrated software components on a single
platform to produce failures caused by interface defects.
The task of the integration test is to check that components or software
applications, e.g. components in a software system or – one step up – software
applications at the company level – interact without error.

Test Results: All the test cases mentioned above passed successfully. No defects
encountered.

(i). Acceptance Testing :User Acceptance Testing is a critical phase of any project
and requires significant participation by the end user. It also ensures that the system
meets the functional requirements.
Test Results: All the test cases mentioned above passed successfully. No defects
encountered.

33
CONCLUSION
The Secure Online Transaction System with Cryptography project has successfully
addressed the limitations of existing online transaction systems by introducing
enhanced security measures and leveraging cryptography techniques. The project's
objectives were to ensure the confidentiality, integrity, and authenticity of online
transactions, safeguard sensitive data, and mitigate the risks associated with
unauthorized access and fraudulent activities. Through the implementation of
robust encryption mechanisms, such as the AES algorithm, the project has
significantly enhanced the data confidentiality of online transactions. By encrypting
transaction data during transmission and storage, the system provides a secure
environment, reducing the risk of data breaches and protecting sensitive
information. Furthermore, the integration with the MySQL database management
system provides efficient storage and retrieval of transaction-related information
while maintaining data integrity and security. Secure practices are implemented to
protect against SQL injection attacks and unauthorized access to the database.
Overall, the Secure Online Transaction System with Cryptography project has
successfully developed a secure environment for online transactions. The project's
outcomes contribute to the field of online transaction security by showcasing the
effective implementation of cryptography techniques and advanced security
measures. The proposed system provides users with enhanced data confidentiality,
integrity, and authentication, promoting trust and confidence in online
transactions. In conclusion, the Secure Online Transaction System with
Cryptography project has successfully addressed the security challenges in online
transactions, providing a robust and secure platform for users to conduct
transactions with confidence.
34
Future Work:

The Secure Online Transaction System with Cryptography project lays a solid
foundation for secure online transactions, but there are several areas for future
work and improvement to enhance its capabilities. The following are potential
avenues for future research and development:

 Advanced Cryptographic Algorithms: While the project has implemented the AES
algorithm for encryption, exploring and integrating other advanced
cryptographic algorithms can provide additional security options. Researching
and evaluating algorithms such as RSA, Elliptic Curve Cryptography (ECC), or post-
quantum cryptography can strengthen the system's cryptographic capabilities.
 Blockchain Integration: Investigating the integration of blockchain technology
into the online transaction system can provide decentralized and tamper-
resistant transaction records. Exploring blockchain frameworks and smart
contracts can enhance the system's transparency, traceability, and resistance to
fraud.
 Biometric Identification: Expanding the authentication mechanisms to include
biometric identification, such as fingerprint or facial recognition, can further
strengthen user authentication. Researching biometric technologies, ensuring
their accuracy and reliability, and integrating them into the system can enhance
security and user experience.
 Continuous Security Monitoring: Implementing real-time security monitoring
and anomaly detection techniques can provide proactive defense against
potential threats. Utilizing machine learning and artificial intelligence algorithms

35
can help identify patterns and detect abnormal behavior, allowing for immediate
response and mitigation of security incidents.
 Compliance with Emerging Regulations: Staying up to date with evolving
regulatory frameworks, such as the General Data Protection Regulation (GDPR)
or Payment Card Industry Data Security Standard (PCI DSS), is crucial. Continually
updating the system to meet compliance requirements ensures the protection of
user data and reduces legal and reputational risks.
 Enhanced User Education and Awareness: Improving user education initiatives to
promote secure online transaction practices is essential. Providing user-friendly
guides, tutorials, and resources on identifying and avoiding scams, phishing
attacks, and other online threats can empower users to make informed decisions
and protect themselves.
 Usability and User Experience Enhancements: Conducting user studies and
feedback sessions to gather insights on the system's usability and user
experience can lead to iterative improvements. Incorporating user-centric design
principles and conducting usability testing can result in a more intuitive and
efficient system interface.
 Penetration Testing and Vulnerability Assessments: Conducting regular
penetration testing and vulnerability assessments to identify and address
potential security weaknesses is critical. Engaging security experts to evaluate
the system's resilience against various attack vectors can enhance its overall
security posture.
 Integration with Emerging Technologies: Exploring the integration of emerging
technologies, such as Internet of Things (IoT) devices or artificial intelligence, into
the online transaction system can open up new possibilities for secure and
36
efficient transactions. Evaluating the security implications and ensuring
compatibility with the existing system architecture are vital considerations.
 Collaboration and Industry Standards: Collaborating with industry experts,
researchers, and organizations to exchange knowledge, share best practices, and
contribute to industry standards can drive the advancement of secure online
transaction systems. Participating in relevant forums, conferences, and
communities can foster innovation and facilitate the exchange of ideas.
 Continued research, development, and innovation in these areas will enable the
Secure Online Transaction System with Cryptography project to stay at the
forefront of online transaction security, providing users with robust and
trustworthy platforms for conducting secure transactions.

37
REFERENCES

 A. Yadva, “Design and Analysis of Digital True Random Number

Generator,” in Background of Random Number Generator, Virginia:


Richmond, 2013.

 2. E. Harrell, “Victims of Identity Theft 2014,” U.S. Department of Justice,


Office of Justice Programs, North Carolina, 2015, pp.1-25.

 3. G.C. Anup, “Credit Card Security,” Finland: Rovaniemen University,


2013.

 4. A. Hedayati, "An Analysis of Identity Theft: Motives, Related Frauds,


Techniques and Prevention." Journal of Law and Conflict Resolution Vol.
4(1), pp. 1-12, January 2012.

 5. V. L. Reddy and T. Anusha. Combine use of steganography and visual


cryptography for online payment system. International Journal of Computer
Applications 124(6), 2015.

 6. B. R. Williams, A. A. Chuvakin, and D. Milroy, PCI compliance: understand


and implement effective PCI data security standard compliance, third
edition. Waltham: Syngress, 2012.

38
 7. C. Hadnagy and P. Wilson, Social engineering: the art of human hacking.
Hoboken, N.J: Wiley, 2011.

 Bhusari, V., and S. Patil. "Study of Hidden Markov Model in Credit Card
Fraudulent Detection." International Journal of Computer Applications, (0975
–8887), Volume 20–No.5, April 2011.

39

You might also like