GLOBAL E-PAYMENT SYSTEM 
Done by 
● Muhammed Hafis PC (10104101) 
● Naveed Enudeen (10104118) 
● Rashid Mohammed Basheer (10104133) 
● Salman Khaja (10104143) 
● Vijith Venugopalan (10104163)
INTRODUCTION 
 There are a lot of people in our society who can’t access or afford current e-payment 
facilities due to lack of resources or finance required. 
 In developing countries, Especially in rural areas a large number of peoples in are 
unable access Internet banking and costly credit card services. 
 In this project we are building a simple and low cost electronic payment system 
which is accessible to public. 
 In this e-payment system the user do not need smartphone, computer or internet 
connection. 
 The user can access various e-payment services through a ATM like public kiosk. 
 This system enables users to use most of internet based e-payment services through a 
public kiosk.
SYSTEM OVERVIEW 
 This system uses concept of virtual money and smartcard for e-payment. 
 When a user register on this system, he/she will get: 
● A VIRTUAL ACCOUNT: In which they have to deposit money for e-payment 
transactions. 
● A UNIQUE USER ID CARD : For identification. 
● A PASSWORD : For authentication. 
 The system consist of network of Central units connected to a central Server. 
 The Central Unit provides an ATM like electronic interface to the user, that is 
placed in public places. 
 By using the ID card and password provided, users can access their account 
and perform various payments (like prepaid mobile recharge, electricity bill 
payments etc.) through the Central Unit. 
 The money used for each payment will be deducted from respective users 
virtual account in the server. 
 The Central Units will be installed throughout the country so any registered user 
can use the system anywhere.
BLOCK DIAGRAM 
SMS 
GATEWAY 
USER 
DATABASE, 
CONTROL & 
MONITORING 
SYSTEM 
VARIOUS 
PAYMENT 
GATEWAYS 
RFID CARD 
LCD 
DISPLAY 
RFID 
MODULE 
KEYPAD 
A 
R 
D 
U 
I 
N 
O 
GSM 
MODULE 
RADIO LINK 
GSM 
NETWORK
COMPONENTS 
● RFID card: Stores user identification data 
● RFID module: For reading data from RFID card and transfer to Micro 
controller unit 
● LCD display : For giving instructions to user and displaying various menus 
● Keypad : Numeric keypad used for entering passwords, amounts and 
selecting various options in menus. 
● Micro controller unit : Used for data processing and interfacing. 
● GSM module : For sending and receiving data between Central Unit and 
server through Short Messaging service (SMS). 
● Server : For storing user data like account details, connecting to third-party 
payment gateways. It sends and receives encrypted data to and from 
central unit through SMS gateway.
WORKING 
● The central unit gets activated and a fresh session will be started when user shows 
RFID card near transceiver of RFID module. 
● The microcontroller reads the unique user identification number from RFID card and 
generate it’s hash 
● And sends the hash code to the server in the following format. 
Device ID Device Mode Message Type Hashed user data 
Field Function 
Device ID Represents of unique ID of central unit 
Device Mode Represents the mode in with central unit is working 
Message Type Represents the content of message 
Hashed user data Contains hashed user ID data
WORKING 
● The server responds by sending back encrypted account details of the user 
corresponding to that RFID card in following format. 
Username Balance User Status 
Field Function 
Username Consist of name of current user 
Balance Consist of balance amount in user account 
User Status Represents status of user account (blocked, good etc.) 
● During this time the central unit prompts the user to enter his/her password. 
● The password entered by user through keypad is used to decrypt the user's details 
received from server.
WORKING 
● Then the user will be provided with various menus for checking account balance, 
selecting different payment for services, choosing service plans, entering amount 
etc. 
● If the amount user entered for transaction is available in balance, An encrypted 
message containing details about menus selected and values entered by user for 
payment of different services is send back to the server. 
Message type Menu1 Menu2 Service ID Amount 
Field Function 
Message type Represents the content of message 
Menu1 Represents ID of 1st menu selected by user. 
Menu2 Represents ID of 2nd menu (inside first menu) selected by 
user. 
Service ID Contain detail about the user’s identification number of 
that server user selected for payment. 
Example: Mobile number, Electricity consumer number etc 
Amount Contains amount entered by user for selected service
WORKING 
● The server receives and decrypt the encrypted message. 
● Then server perform various e-payment procedures as mentioned in the message 
send by central unit, though different e-payment gateways. 
● Server updates the database of current user with a new balance.
Arduino Program Algorithm 
START 
CHECK FOR RFID CARD 
IS CARD 
AVAILABLE DISPLAY MENUS TO SELECT SERVICES AND 
READ RFID DATA 
NO 
GENERATE SHA-1 HASH OF RFID DATA 
SENT HASHED DATA TO SERVER 
PROMPTS TO ENTER PASSWORD 
WAIT FOR SERVER REPLY 
DECRYPT RECEIVED DATA 
PURSE RECEIVED DATA 
DISPLAY NAME, BALANCE AND STATUS OF USER 
IS STATUS IS 
GOOD? 
FIELDS TO ENTER USER ID OF RESPETIVE 
SERVICES AND AMOUNTS. 
IS ENTERED 
AMOUNT IS LESS 
THAN BALANCE 
AVAILABLE 
DISPLAY MENUS TO SELECT SERVICES AND 
FIELDS TO ENTER USER ID OF RESPETIVE 
SERVICES AND AMOUNTS. 
ENCRYPTED USER ENTERED DATAS 
SEND ENCRYPTED DATA TO SERVER 
STOP 
CONTACT CUSTOMER 
CARE 
TRY AGAIN 
NO 
NO 
YES 
YES 
YES
Server Program Algorithm 
START 
CHECK FOR 1st MESSAGE 
IS NEW MESSAGE 
RECEIVED? 
SEARCH FOR USER CORRESPONDING TO RECEIVED DATA IN RECEIVED 
MESSAGE IN DATABASE 
ENCRYPT CORRESPONDING USER’S DATA 
CONVERTING CIPHER FROM UNSIGNED BYTE INTO ASCII 
SENT ENCYPTED DATA TO CENTRAL UNIT 
CHECK FOR 2nd MESSAGE 
IS NEW MESSAGE 
RECEIVED? 
DECRYPT THE MESSAGE 
PURSE DECRYPTED MESSAGE 
SENT DETAILS ABOUT PAYMENT IN RECEIVED 
MASSAGE TO CORRESPONDING PAYMENT 
GATEWAY 
UPDATE BALANCE CORRESPONDING 
STOP 
NO 
NO 
YES 
YES 
CONVERTING DATA FROM ASCII UNSIGNED BYTE
CRYPTOGRAPHY 
 Since this is a system that deals with money we needs more security. 
 It is necessary to hide all data exchanges in this system from any unauthorized third 
party. 
 We need to secure the identification key inside user ID cards and all communications 
between the server and central unit. 
 Because if any unauthorized person got the code inside user ID card he can clone it 
and access corresponding users account. 
 Also if a intruder gets access to our communication channel, he can intercept and 
alter the data exchanged in his favor. 
 These may leads to frauds and failure of system. 
 So we needs to use cryptography in order to prevent these problems. 
 Cryptography enables to store or transmit sensitive information across insecure 
networks so that it cannot be read by anyone except the intended recipient.
ALGORITHM SELECTION 
 For encryption and decryption of data we choose symmetric key algorithm. 
 Because here both ends knows the key to encrypt and decrypt. 
 Among different symmetric key algorithms we choose Advanced 
Encryption Standard (AES) . 
 AES is fast in both software and hardware, is relatively easy to implement, 
and requires little memory and computing power. 
 It is more suitable embedded environments like Arduino. 
 For hashing we used SHA-1 algorithm over because MD5 is bad due to 
collision problems and need less computation power.
SHA-1 HASH FUNCTION 
 Designed by the NSA, following the structure of MD4 and MD5. 
 Stands for Secure Hash Algorithm 
 Maps strings of any length to strings of 160 bit. 
 In this project we use SHA-1 generate hash of user identification code inside the user 
ID card. 
 And we only sent this unique hash corresponding to that user ID card to the server via 
GSM network. 
 So third parties can’t get the real identification code inside user ID card. 
 Server knows the SHA-1 hash corresponding to each user, so it can identify the user 
behind that hash. 
 This will prevent the cloning of user ID card.
Advanced Encryption Standard (AES) 
 Advanced Encryption Standard (AES), also known as Rijndael, is a block cipher 
adopted as an encryption standard by the U.S. government in late 90’s 
 AES is requires less computation power and it cannot cracked practically using any 
of current cryptanalysis methods. 
 Here we are using AES-128, that uses 128 bit key for encryption. 
 Cipher Detail: 
 Key sizes: 128 bits 
 Plane text block size: 128 bits 
 Cypher text block size: 128 bits 
 In our project we use AES to encrypt and decrypt data exchanged between Central 
unit and server as SMS through GSM network. 
 Password given to user is used as the key for AES algorithm. 
 So that no third party can access or modify the original data. 
 This provides confidentiality and prevent men in middle attacks.
MERITS & DEMERITS 
MERITS : 
 Low cost implementation. 
 Accessible to public 24x7 hours 
 Maximum security. 
 No need of internet. 
 Users do not need any high cost equipment or services for e-payment. 
 No need for bank account. 
 Centralized. 
 Low power consumption 
 No problem of exact change tender 
DEMERITS : 
 Communication using SMS is slow when compared to TCP/IP methods.
Future works 
 Can be used at toll booths for collecting toll. 
 Can be interfaced with vending machines. 
 Can be also interfaced with taxi meter. 
 Can be used for payments in public transport.
THE END

More Related Content

PPTX
Electronic payment System
PPT
Electronic Payment Systems Shortened
PPTX
Electronic payment system(EPS)
PPT
Ec2009 ch11 electronic payment systems
PPTX
Epayments system in India and globally iit project
PPTX
Electronic payment system
PPTX
E-payment and E-payment System (EPS) / Classification of E-payment
PPTX
E commerce & m-commerce payment systems
Electronic payment System
Electronic Payment Systems Shortened
Electronic payment system(EPS)
Ec2009 ch11 electronic payment systems
Epayments system in India and globally iit project
Electronic payment system
E-payment and E-payment System (EPS) / Classification of E-payment
E commerce & m-commerce payment systems

What's hot (18)

PPTX
Online payment system
PPT
Electronic payment system for e-commerce
PPT
Chandra e payment system
PPT
Web payment system
PPSX
Payment systems for electronic commerce
PPTX
E-payment
PPT
Electronic payments ystem
PPTX
Electronic Payment Systems in E Commerce
PPTX
digital tokens based on E-payments
PPTX
6. electronic payment systems
PPT
Electronic Payment System
PPTX
PDF
electronic commerce payment systems
PPTX
Jithin m
PPTX
E -payment ppt
PPTX
Cyber cash
PPT
E Cheques
PPTX
E-Payment
Online payment system
Electronic payment system for e-commerce
Chandra e payment system
Web payment system
Payment systems for electronic commerce
E-payment
Electronic payments ystem
Electronic Payment Systems in E Commerce
digital tokens based on E-payments
6. electronic payment systems
Electronic Payment System
electronic commerce payment systems
Jithin m
E -payment ppt
Cyber cash
E Cheques
E-Payment
Ad

Viewers also liked (20)

PPTX
The electronic payment systems
PDF
E payment_system1_257091537
PDF
Payment system (e-money processing)
PPTX
E payment system
PPT
E Payment
PPTX
Electronic Payment Systems (EPS)
PPT
E payment
PPT
E payment methodss
PDF
Understand Bitcoin in 5 minutes
PDF
bitcoin pricing - jan2017
PDF
The fundamentals of cryptocurrencies
PPTX
Study on Bitcoin
PPT
4. E-Commerce & Payment System
DOC
E payment method
PPTX
Electronic payment systems - Presentation by IrfanAnsari.com
PPT
E-Payment methods
PPTX
Aes (advance encryption standard)
PPTX
Electronic payment System
PPTX
Electronic payment system
PDF
Can Bitcoin be forecasted like any other asset?
The electronic payment systems
E payment_system1_257091537
Payment system (e-money processing)
E payment system
E Payment
Electronic Payment Systems (EPS)
E payment
E payment methodss
Understand Bitcoin in 5 minutes
bitcoin pricing - jan2017
The fundamentals of cryptocurrencies
Study on Bitcoin
4. E-Commerce & Payment System
E payment method
Electronic payment systems - Presentation by IrfanAnsari.com
E-Payment methods
Aes (advance encryption standard)
Electronic payment System
Electronic payment system
Can Bitcoin be forecasted like any other asset?
Ad

Similar to Global e payment system ppt (20)

PPTX
E-town Banking system
PDF
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
PDF
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
PPTX
Paperless ticket system
PDF
Ecash notes
PDF
A NOVEL APPROACH FOR E-PAYMENT USING VIRTUAL PASSWORD SYSTEM
PDF
A Novel Approach for E-Payment Using Virtual Password System
PDF
MOBILE BASED SECURE DIGITAL WALLET FOR PEER TO PEER PAYMENT SYSTEM
PDF
Mobile based secure digital wallet for peer to peer payment system
PDF
harry_mapengo_project.compressed
PPTX
E secure transaction project ppt(Design and implementation of e-secure trans...
PDF
Secured e-payment system based on automated authentication data and iterated ...
PPT
Cryptographysecurity 1222867498937700-9
PPTX
DOCX
Bank security using MC
PDF
Secure Web Transaction
PDF
electronicpaymentsystem-12697023522629-phpapp01.pdf
PPTX
Online paymentusingsteganographt&Visualcryptography
PDF
eSmartlock - an antipiracy dongle with integrated DRM functionalities
PPT
E cash payment
E-town Banking system
ONLINE PAYMENT SYSTEM WITH PHISHING AND DDOS DETECTION AND PREVENTION
IRJET- Guarded Remittance System Employing WANET for Catastrophe Region
Paperless ticket system
Ecash notes
A NOVEL APPROACH FOR E-PAYMENT USING VIRTUAL PASSWORD SYSTEM
A Novel Approach for E-Payment Using Virtual Password System
MOBILE BASED SECURE DIGITAL WALLET FOR PEER TO PEER PAYMENT SYSTEM
Mobile based secure digital wallet for peer to peer payment system
harry_mapengo_project.compressed
E secure transaction project ppt(Design and implementation of e-secure trans...
Secured e-payment system based on automated authentication data and iterated ...
Cryptographysecurity 1222867498937700-9
Bank security using MC
Secure Web Transaction
electronicpaymentsystem-12697023522629-phpapp01.pdf
Online paymentusingsteganographt&Visualcryptography
eSmartlock - an antipiracy dongle with integrated DRM functionalities
E cash payment

Recently uploaded (20)

PPTX
Magnesium_and_Phosphorus_Presentation.pptx
DOCX
EKG reading for serious individuals. Where are you?
PPT
Light utility vehicles 522024.ppt
PPTX
UAV WHAT MINERAL ARE REQUIRED FOR MAKING OF UAV
PPTX
Orange and Purple Gradient Computer Networking Technology Presentation.pptx
PPT
COA______________₹₹_₹₹33₹₹₹33₹₹₹3UNIT1V8.ppt
PPT
The process of making an electrical connection by melting low-temperature met...
DOCX
Buy Abortion Pills Best Prices In Qatar$
PDF
script scriptscriptscriptscriptscriptscript
PPTX
Presentation utk shar baurlah bhhkuaie.pptx
DOCX
Workplace Transformation Market Outlook 2024–2031: Redefining the Future of Work
PPTX
Purple Pink Gradient Modern Metaverse Presentation_20250817_191428_0000.pptx
PPTX
SAI-CAO-24CSEN2021-PPT-UNIT-------1.pptx
PDF
Research_on_Rail_Pressure_Control_of_High-Pressure.pdf
PPT
Soldering technics Aerospace electronic assembly
PDF
Secondary Research in Case Competitions.pdf
PDF
crc presentation44444444444444444444.pdf
PPTX
5. PPT Bersikap Kreatif.pptxjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj
PDF
Gain improved scalability over networks and sub-networks using DVI extender
PPTX
F&B 5th Semester exam Class Notes (2).pptx
Magnesium_and_Phosphorus_Presentation.pptx
EKG reading for serious individuals. Where are you?
Light utility vehicles 522024.ppt
UAV WHAT MINERAL ARE REQUIRED FOR MAKING OF UAV
Orange and Purple Gradient Computer Networking Technology Presentation.pptx
COA______________₹₹_₹₹33₹₹₹33₹₹₹3UNIT1V8.ppt
The process of making an electrical connection by melting low-temperature met...
Buy Abortion Pills Best Prices In Qatar$
script scriptscriptscriptscriptscriptscript
Presentation utk shar baurlah bhhkuaie.pptx
Workplace Transformation Market Outlook 2024–2031: Redefining the Future of Work
Purple Pink Gradient Modern Metaverse Presentation_20250817_191428_0000.pptx
SAI-CAO-24CSEN2021-PPT-UNIT-------1.pptx
Research_on_Rail_Pressure_Control_of_High-Pressure.pdf
Soldering technics Aerospace electronic assembly
Secondary Research in Case Competitions.pdf
crc presentation44444444444444444444.pdf
5. PPT Bersikap Kreatif.pptxjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjjj
Gain improved scalability over networks and sub-networks using DVI extender
F&B 5th Semester exam Class Notes (2).pptx

Global e payment system ppt

  • 1. GLOBAL E-PAYMENT SYSTEM Done by ● Muhammed Hafis PC (10104101) ● Naveed Enudeen (10104118) ● Rashid Mohammed Basheer (10104133) ● Salman Khaja (10104143) ● Vijith Venugopalan (10104163)
  • 2. INTRODUCTION  There are a lot of people in our society who can’t access or afford current e-payment facilities due to lack of resources or finance required.  In developing countries, Especially in rural areas a large number of peoples in are unable access Internet banking and costly credit card services.  In this project we are building a simple and low cost electronic payment system which is accessible to public.  In this e-payment system the user do not need smartphone, computer or internet connection.  The user can access various e-payment services through a ATM like public kiosk.  This system enables users to use most of internet based e-payment services through a public kiosk.
  • 3. SYSTEM OVERVIEW  This system uses concept of virtual money and smartcard for e-payment.  When a user register on this system, he/she will get: ● A VIRTUAL ACCOUNT: In which they have to deposit money for e-payment transactions. ● A UNIQUE USER ID CARD : For identification. ● A PASSWORD : For authentication.  The system consist of network of Central units connected to a central Server.  The Central Unit provides an ATM like electronic interface to the user, that is placed in public places.  By using the ID card and password provided, users can access their account and perform various payments (like prepaid mobile recharge, electricity bill payments etc.) through the Central Unit.  The money used for each payment will be deducted from respective users virtual account in the server.  The Central Units will be installed throughout the country so any registered user can use the system anywhere.
  • 4. BLOCK DIAGRAM SMS GATEWAY USER DATABASE, CONTROL & MONITORING SYSTEM VARIOUS PAYMENT GATEWAYS RFID CARD LCD DISPLAY RFID MODULE KEYPAD A R D U I N O GSM MODULE RADIO LINK GSM NETWORK
  • 5. COMPONENTS ● RFID card: Stores user identification data ● RFID module: For reading data from RFID card and transfer to Micro controller unit ● LCD display : For giving instructions to user and displaying various menus ● Keypad : Numeric keypad used for entering passwords, amounts and selecting various options in menus. ● Micro controller unit : Used for data processing and interfacing. ● GSM module : For sending and receiving data between Central Unit and server through Short Messaging service (SMS). ● Server : For storing user data like account details, connecting to third-party payment gateways. It sends and receives encrypted data to and from central unit through SMS gateway.
  • 6. WORKING ● The central unit gets activated and a fresh session will be started when user shows RFID card near transceiver of RFID module. ● The microcontroller reads the unique user identification number from RFID card and generate it’s hash ● And sends the hash code to the server in the following format. Device ID Device Mode Message Type Hashed user data Field Function Device ID Represents of unique ID of central unit Device Mode Represents the mode in with central unit is working Message Type Represents the content of message Hashed user data Contains hashed user ID data
  • 7. WORKING ● The server responds by sending back encrypted account details of the user corresponding to that RFID card in following format. Username Balance User Status Field Function Username Consist of name of current user Balance Consist of balance amount in user account User Status Represents status of user account (blocked, good etc.) ● During this time the central unit prompts the user to enter his/her password. ● The password entered by user through keypad is used to decrypt the user's details received from server.
  • 8. WORKING ● Then the user will be provided with various menus for checking account balance, selecting different payment for services, choosing service plans, entering amount etc. ● If the amount user entered for transaction is available in balance, An encrypted message containing details about menus selected and values entered by user for payment of different services is send back to the server. Message type Menu1 Menu2 Service ID Amount Field Function Message type Represents the content of message Menu1 Represents ID of 1st menu selected by user. Menu2 Represents ID of 2nd menu (inside first menu) selected by user. Service ID Contain detail about the user’s identification number of that server user selected for payment. Example: Mobile number, Electricity consumer number etc Amount Contains amount entered by user for selected service
  • 9. WORKING ● The server receives and decrypt the encrypted message. ● Then server perform various e-payment procedures as mentioned in the message send by central unit, though different e-payment gateways. ● Server updates the database of current user with a new balance.
  • 10. Arduino Program Algorithm START CHECK FOR RFID CARD IS CARD AVAILABLE DISPLAY MENUS TO SELECT SERVICES AND READ RFID DATA NO GENERATE SHA-1 HASH OF RFID DATA SENT HASHED DATA TO SERVER PROMPTS TO ENTER PASSWORD WAIT FOR SERVER REPLY DECRYPT RECEIVED DATA PURSE RECEIVED DATA DISPLAY NAME, BALANCE AND STATUS OF USER IS STATUS IS GOOD? FIELDS TO ENTER USER ID OF RESPETIVE SERVICES AND AMOUNTS. IS ENTERED AMOUNT IS LESS THAN BALANCE AVAILABLE DISPLAY MENUS TO SELECT SERVICES AND FIELDS TO ENTER USER ID OF RESPETIVE SERVICES AND AMOUNTS. ENCRYPTED USER ENTERED DATAS SEND ENCRYPTED DATA TO SERVER STOP CONTACT CUSTOMER CARE TRY AGAIN NO NO YES YES YES
  • 11. Server Program Algorithm START CHECK FOR 1st MESSAGE IS NEW MESSAGE RECEIVED? SEARCH FOR USER CORRESPONDING TO RECEIVED DATA IN RECEIVED MESSAGE IN DATABASE ENCRYPT CORRESPONDING USER’S DATA CONVERTING CIPHER FROM UNSIGNED BYTE INTO ASCII SENT ENCYPTED DATA TO CENTRAL UNIT CHECK FOR 2nd MESSAGE IS NEW MESSAGE RECEIVED? DECRYPT THE MESSAGE PURSE DECRYPTED MESSAGE SENT DETAILS ABOUT PAYMENT IN RECEIVED MASSAGE TO CORRESPONDING PAYMENT GATEWAY UPDATE BALANCE CORRESPONDING STOP NO NO YES YES CONVERTING DATA FROM ASCII UNSIGNED BYTE
  • 12. CRYPTOGRAPHY  Since this is a system that deals with money we needs more security.  It is necessary to hide all data exchanges in this system from any unauthorized third party.  We need to secure the identification key inside user ID cards and all communications between the server and central unit.  Because if any unauthorized person got the code inside user ID card he can clone it and access corresponding users account.  Also if a intruder gets access to our communication channel, he can intercept and alter the data exchanged in his favor.  These may leads to frauds and failure of system.  So we needs to use cryptography in order to prevent these problems.  Cryptography enables to store or transmit sensitive information across insecure networks so that it cannot be read by anyone except the intended recipient.
  • 13. ALGORITHM SELECTION  For encryption and decryption of data we choose symmetric key algorithm.  Because here both ends knows the key to encrypt and decrypt.  Among different symmetric key algorithms we choose Advanced Encryption Standard (AES) .  AES is fast in both software and hardware, is relatively easy to implement, and requires little memory and computing power.  It is more suitable embedded environments like Arduino.  For hashing we used SHA-1 algorithm over because MD5 is bad due to collision problems and need less computation power.
  • 14. SHA-1 HASH FUNCTION  Designed by the NSA, following the structure of MD4 and MD5.  Stands for Secure Hash Algorithm  Maps strings of any length to strings of 160 bit.  In this project we use SHA-1 generate hash of user identification code inside the user ID card.  And we only sent this unique hash corresponding to that user ID card to the server via GSM network.  So third parties can’t get the real identification code inside user ID card.  Server knows the SHA-1 hash corresponding to each user, so it can identify the user behind that hash.  This will prevent the cloning of user ID card.
  • 15. Advanced Encryption Standard (AES)  Advanced Encryption Standard (AES), also known as Rijndael, is a block cipher adopted as an encryption standard by the U.S. government in late 90’s  AES is requires less computation power and it cannot cracked practically using any of current cryptanalysis methods.  Here we are using AES-128, that uses 128 bit key for encryption.  Cipher Detail:  Key sizes: 128 bits  Plane text block size: 128 bits  Cypher text block size: 128 bits  In our project we use AES to encrypt and decrypt data exchanged between Central unit and server as SMS through GSM network.  Password given to user is used as the key for AES algorithm.  So that no third party can access or modify the original data.  This provides confidentiality and prevent men in middle attacks.
  • 16. MERITS & DEMERITS MERITS :  Low cost implementation.  Accessible to public 24x7 hours  Maximum security.  No need of internet.  Users do not need any high cost equipment or services for e-payment.  No need for bank account.  Centralized.  Low power consumption  No problem of exact change tender DEMERITS :  Communication using SMS is slow when compared to TCP/IP methods.
  • 17. Future works  Can be used at toll booths for collecting toll.  Can be interfaced with vending machines.  Can be also interfaced with taxi meter.  Can be used for payments in public transport.