Secure Electronic Transfer
Electronic commerce, as exemplified by the popularity of the Internet, is going to have an
enormous impact on the financial services industry. No financial institution will be left unaffected
by the explosion of electronic commerce. Even though the existing password verification system is
extremely used and widely accepted as the online payment standard, it is not much efficient. Visa
and MasterCard and a consortium of technology companies made a promise to banks, merchants,
and consumers: they would make the Internet safe for credit card transactions and send
electronic commerce revenues skyward. With great fanfare, we introduce a new method to make
the Electronic Transaction Secure for processing online credit card purchases. Our system can be
used to allow the transfer of secure information over the Internet. Examples include credit card
numbers, bank account numbers, government-issued identification numbers and other data that
must be exchanged to complete a financial transaction. It most often is employed for electronic
commerce using credit cards or direct withdrawal of funds from a bank account and for sensitive
activities such as online investing or online management of a bank account. In fact, the
development of secure electronic transactions integrated into a website's payment system has
made electronic commerce not only possible but in many ways safer and more secure than
traditional financial transactions.
Secure electronic payment system is to be secure for clients such as customers and shop
owners. The security architecture of the system is designed by RC5 encryption / decryption
algorithm. This eliminates the fraud that occurs today with stolen credit card numbers. The
symmetric key cryptosystem RC5 can protect conventional transaction data such as account
numbers, amount and other information. This process can be done electronically using RC5
encryption / decryption program .There is no danger of any data sent within the system
being intercepted, and replaced.
The alternative is to use the existing network, and to encrypt all data transmissions.
The system with encryption is acceptably secure, but that the level of encryption has to be
stepped up, as computing power increases. Results In order to be secure the system the
communication between modules is encrypted using symmetric key cryptosystem RC5. The
system will use simple user name, password, user ID, user type and cipher authentication
mechanism for identification, when the user first enters the system. It is the most common
method of authentication in most computer system.
In electronic payment system, server stores records of every transaction. When the
electronic payment system eventually goes online to communicate with the shops and the
customers who can deposit their money and the server uploads these records for auditing
The Secure Electronics Transaction protocol has three principle features:
All sensitive information sent between the three parties is encrypted.
All three parties are required to authenticate themselves with certificates.
The merchant never sees the customer's card number in plaintext.
In SET, message data is encrypted using a randomly generated symmetric key
(a DES 56-bit key). This key, in turn, is encrypted using the message recipient’s
public key (RSA). The result is the so called “digital envelope” of the message.
This combines the encryption speed of DES with the key management
advantages of RSA public-key encryption. After encryption, the envelope and the encrypted
message itself are sent to the recipient. After receiving the encrypted data, the recipient decrypts
the digital envelope first using his or her private key to obtain the randomly generated symmetric
key and then uses the symmetric key to unlock the original message
1. Admin Module
2. Customer Module
3. Design & Payment History
4. Mail & Payment Gateway
In the admin module, we have to add the new product and maintain the customer
information and payment history.
In SET, the card holder is the same as any normal person wishing to use their card to purchase
goods in a shop and individual customer payment
Database Module & Registration Form
Databases are most useful when it comes to storing information that fits into logical categories
With a database you can group different parts of your business into separate tables to help store
your information logically.
The Registration form is use for the online purchasing. After complete the registration
particular user get the secret number is given for the online purchasing.
Design & Payment History
In this module we have to design the form, how the flow is working
Overall the project.
If the customer completed the transaction payment history should maintain the admin
module. Because of the secure purpose the customer should do any illegal problem
Email & Payment Gateway
In the module we have to auto generate a verification code that code send to your
particular email id. That code you enter then only process is completed. That code is for secure
Working on behalf of the acquirer, the payment gateway processes the card, bridging the gap
between electronic purchases and the existing credit card networks.