Your Paragraph Text
Your Paragraph Text
1. Presentation Layer
Description: This layer handles the user interface and interaction.
It uses JavaFX to create tabs, buttons, and input fields for
seamless navigation and user experience.
Components:
Tabs: Users Data, Add Users, Operations.
UI Elements: TextFields, PasswordFields, ListView, Alerts, and
Dialogs.
2. Application Logic Layer
Description: This layer processes user actions, validates inputs,
and invokes necessary operations like encryption or data updates.
Modules:
User Management Module: Adds and retrieves user data.
Transaction Module: Handles banking operations (deposit,
withdrawal, transfer).
Security Module: Manages encryption and decryption.
3. Data Layer
Description: Responsible for storing and managing user data. In
the current implementation, this is handled in-memory, but future
enhancements could integrate a database.
Features:
Temporary in-memory data storage.
Potential for integration with persistent storage like MySQL.
4. Security Layer
Description: Ensures confidentiality and integrity of sensitive
data.
Mechanism: Utilizes Vigenère Cipher for encrypting sensitive
fields such as phone numbers, emails, and balances.
Results
The implemented ATM system achieves the
following:
1. User Management: Successfully registers and
displays user data with encrypted sensitive
information.
2. Secure Transactions: Processes deposits,
withdrawals, and transfers while maintaining
data confidentiality.
3. Authentication: Prevents unauthorized
access with secure login and account lockout
after three failed attempts.
4. Encryption Integrity: Ensures encrypted data
remains secure and decryptable using the
user’s password as the key.
5. Usability: Provides an intuitive interface for
administrators and users to perform
operations efficiently.
Literature Review
1. Cryptographic Techniques in ATM Systems: The
security of ATM systems has always been a top
priority, with encryption methods playing a key
role in protecting sensitive data. Research has
shown that traditional symmetric encryption
algorithms, such as the Vigenère cipher, can
effectively secure user data when applied properly.
The Vigenère cipher, despite being a relatively
older algorithm, remains an effective choice for
simple applications due to its ability to encrypt
arbitrary data with a secret key.
2. Encryption Algorithms in ATM Systems:
Research by Patel & Mehta (2019) highlighted the
importance of encryption in ATM systems,
focusing on symmetric key algorithms like AES
(Advanced Encryption Standard) and RSA
(Rivest-Shamir-Adleman). While AES is widely
used in high-security applications, simpler
methods such as the Vigenère cipher are often
chosen in applications with moderate security
needs.
3.User Authentication and Security: User
authentication is an essential aspect of any ATM
system. Kumar & Sharma (2018) discuss various
techniques for user verification, including PIN-
based authentication, biometric systems, and
multi-factor authentication (MFA). This project uses
password-based authentication as a simple
approach to verify users before granting access to
their accounts. This method is combined with
encryption techniques to ensure that user data
remains protected even in the case of
unauthorized access attempts.