Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
SAL INSTITUTE OF TECHNOLOGY & ENGINEERING RESEARCH Science City Road, Bhadaj, Ahmedabad-380060
Page 1
CERTIFICATE
Date: / / 2013
This is to certify that the dissertation entitled SEMINAR/PROJECT TITLE has been carried out by
under my guidance in fulfillment of the degree of Bachelor of Engineering in Electronics & communication (7th Semester/8th Semester) of Gujarat Technological University, Ahmedabad during the academic year 2012-13.
Guide: Mr. Rajani Kansagra (External) Miss. Nirali C. Shah (Internal) Head of the Department Nidhi N Bhatt
Sal Institute Of Technology & Engineering Research
Page 2
ACKNOWLEDGEMENTS
It is a known fact that words are never sufficient to express the exact amount of gratitude that a person feels, but words are the only way we can express our feeling. We would therefore like to express our hearty thanks to our project guide Mr. Rajnibhai Kansagra & Miss. Nirali C. Shah for the invaluable guidance, encouragement & kind co-operation extended by him during the term of our project.
Page 3
ABSTRACT
Using SMS Based Voting machine we can vote from our home just by sending a sms a specified format from our mobile. The entire voters will be provided with a unique password (pin) and identification number.
For voting we have to send a sms in a predefined format. The voting machine will receive this messages and decode the message and verify the Pin number and identification number if both number matches the voting machine will accept the vote else the message is rejected by the machine..
The voting machine is implemented using 89S52 microcontroller. A GSM MODEM is used to receive messages from voters. The microcontroller accepts this message and verifies the message and keep updates. A key is activated used to view the result. An LCD is used to display the final result.
Page 4
TABLE OF CONTENTS
Certificate. .....................2 Acknowledgements........3 Abstract..................4 Table of Contents...................5 List of Tables......6 List of Figure......7 Chapters..8 Future Planning47 Conclusion47 Reference..48
Page 5
List of Tables
Table 3.1.6: Voltage and Current level in TTL logic...18 Table 3.1.7: Port description........19 Table 3.6.4: Operation according to RS and RW signal..28
Page 6
LIST OF FIGURES
Figure 1: Block Diagram......13 Figure 3.1: Microcontroller Bolck Diagram.....15 Figure 3.1.1: Pin diagram of 89s52..16 Figure 3.1.3: Basic circuit -that makes 89s52 works ..17 Figure 3.1.7: Internal circuitary for the 89s52 port .19 Figure 3.2.2: Max 232......23 Figure 3.2.3: Max 232 interfacing interfacing ....23 Figure 3.4.1: GSM interfacing.25 Figure 3.6: LED....25 Figure 3.7: LCD...26 Figure 3.7.1: LCD block diagram....26 Figure 3.9 : Voltage Regulator.29 Figure 4.1: Circuit diagram..30 Figure 4.2.1: Interfacing with LCD... 31 Figure 3.7.1: Interfacing with LED .....31 Figure 5.2: Flow Chart.....34
Page 7
Page 8
Page 9
Chapter 1 INTRODUCTION
Voting is a vital part of the democratic process. In democratic societies, voting is an important tool to collect and reflect peoples opinions. Traditionally, a voter can cast vote after going to the designated polling place and checking his identity. This makes man directly to count the ballots and counting of votes to be long. These paper-based systems can result in a number of problems, including:
Unacceptable percentages of lost, stolen, or miscounted ballots Votes lost through unclear or invalid ballot marks Limited accommodations for people with disabilities
In an e-voting by touch screen, a voter directly selects candidates or the vote content appeared on a screen as the finger. This voting with fast counting time has also a problem that voters go to the polling place. In the meantime, an e-voting using internet has no inconvenience that voters should visit the voting booth. However, this voting is executed just in the environment with internet accessible computer.
In this project, we proposes an e-voting system that allows a voter to be identified using a wireless certificate without additionally registering when a user votes using his mobile terminal such as a cellular phone. We also present a method that ensures the anonymity of voter and the confidentiality of vote content. By our mobile voting system, a voter can cast his vote more easily and conveniently than the existing e-voting using internet, within the scheduled time period anywhere even when a voter is not able to access internet on a voting day. Our proposal can be applied not only to election but also for college election
Page 10
In the existing offfine voting method to select a candidate in the election such as presidential election, the assembly election, or local election, electorates go to the designated polling places and have to be identified to cast their votes, and finally voters cast their ballot. Of course, voters should be in advance registered on a poll book. To do so, a significant amount of time and cost are consumed by voting and counting of votes. In the mean time, the most important security issue for on-line electronic voting using touch screen or internet is to guarantee the anonymity of voter and the confidentiality of vote content. The followings are requirements that should be considered for secure and trustworthy e-voting. - The relation between voter and vote content should not be revealed. - The result of a poll should be retained as a secret before counting the ballot. - A voter can cast his vote just one time. - Only an identified person by an e-voting device can participate in e-voting. - Other people excepting a voter himself should not know the vote content. - It is not permitted to rig the ballot An e-voting method using a touch screen which allows a voter to select a candidate or an option displayed on a screen has advantages in that a voter can cast his vote regardless of his assigned polling place, but in this case, a voter is still required to go to a polling booth to vote. As other e-voting method, a voter does not have to go to a polling place if he uses internet and vote is permitted to internet user. But, internet-accessible terminals are always required to vote and a voter can cast a vote in the just limited place which he can access internet. Especially, private data like personal ID might be leaked in the course of accessing to the internet. This means that anonymity of electronically voting over the internet is not satisfied. Also, confidentiality of voting might not be ensured if a candidate selection or a voting content is not encrypted.
Page 11
CRYSTAL FREQUENCY(24MHZ)
2) GSM MODULE(SIM 300): MIN-MAX(VOLTAGE)3.4V TO 5V 3) TRANSFORMER : OUTPUT VOLTAGE=12VAC CURRENT=750mA 4) DIODES 4007-2 : 1AMP BREAKDOWN VOLTAGE=1000V 5) TRANSISTOR(BC547): 400mA BREAKDOWN VOLTAGE= 45V CURRENT GAIN=100-300OHM 6) 5V REGULATOR 7805 WITH HEATSINK : INPUT= 12V-45V DC
OUTPUT=5V DC
7) MAX 232: INPUT=5V OUTPUT=10(+-) 8) LED: INPUT CURRENT=10-20mA
Page 12
VOTER
SMS 8051
GSM MODULE
LEDS
MAX 232
TO ALL BLOCKS
POWER SUPPLY
Page 13
Page 14
The hardware is driven by a set of program instructions, or software. Once familiar with hardware and software, the user can then apply the microcontroller to the problems easily.
Page 15
P3 is shared with control lines Serial I/O RxD, TxD, External Interrupts INT0 & INT1 Counter control T0, T1 P0 and P2 are multiplexed with Address and Data bus FIG 3 PIN DIAGARM OF 89S52
Page 16
89S52 has an on-chip It needs an external crystal thats decides the operating frequency of the 89S52. This can be achieved in two ways.The crystal is connected to pins 18 and 19 with stabilizing capacitors. 12 MHz (11.059MHz) crystal is often used and the capacitance ranges from 20pF to 40pF. The oscillator can also be a TTL clock source connected with a NOT gate as shown above
Fig. 4 BASIC CIRCUIT -THAT MAKES 89S52 WORKS If primary current exists and the secondary circuit of a CT is closed, the winding builds and maintains a counter or back EMF to the primary magnetizing force. Should the secondary be opened with current in the primary, the counter EMF is removed; and the primary magnetizing force builds up an extremely high Potential Transformer in switchyard. Inside Potential Transformer with Fuses. Voltage in the secondary, which is dangerous to personnel and can destroy the current transformer.
Page 17
Current Virtually no current flow 1.6mA Sinking current from TTL input to ground
Table 1
Page 18
Table 2 The 89S52 internal ports are partly bi-directional (Quasi-bi-directional). The following is the internal circuitry for the 89S52 port pins:
Page 19
1.Configuring for output P0 is open drain. Has to be pulled high by external 10K resistors. Not needed if P0 is used for address lines Writing to a port pin loads data into a port latch that drives a FET connected to the port pin. P0: Note that the pull-up is absent on Port 0 except when functioning as the external address/data bus. When a "0" is written to a bit in port 0, the pin is pulled low. But when a "1" is written to it, it is in high impedance (disconnected) state. So when using port 0 for output, an external pull-up resistor is needed, depending on the input characteristics of the device driven by the port pin
P1, P2, P3 have internal pull-ups: When a "0" is written to a bit in these port , the pin is pulled low ( FET-ON) ,also when 1 is written to a bit in these port pin becomes high (FETOFF) thus using port P1,P2,P3 is simple. 2. Configuring for input At power-on all are output ports by default To configure any port for input, write all 1s (0xFF) to the port Latch bit=1, FET=OFF, Read Pin asserted by read instruction You can used a port for output any time. But for input, the FET must be off. Otherwise, you will be reading your own latch rather than the signal coming from the outside. Therefore, a "1" should be written to the pin if you want to use it as input, especially when you have used it for output before. If you don't do this input high voltage will get grounded through FET so you will read pin as low and not as high. An external device cannot easily drive it high so, you should not tide a port high directly without any resistor. Otherwise, the FET would burn
Page 20
3.2.8 Be Careful :
Some port pins serve multiple functions. Be careful writing to such ports. For example, P3.0 is the UART RXD (serial input), and P3.1 is the UART TXD (serial output). If you set P3.0 to a '0', an external buffer (such as an RS232 level translator) cannot drive it high. Therefore you have prevented receiving any serial input. If an external interrupt such as EX1 on P3.3 is enabled, and set to be level sensitive, and you clear this pin's output latch to a zero, guess what? You've just caused a perpetual interrupt 1. The pin's input buffer will read the output of it's latch as always low. Your controller will spend all of its time in the interrupt handler code and will appear to have crashed, since it will have very little time for other tasks. In fact, it will get to execute a single instruction before re-entering the interrupt handler, so the rest of your program will execute very, very slowly
3.3 MAX232:
The MAX232 is an integrated circuit that converts signals from an RS-232 serial port to signals suitable for use in TTL compatible digital logic circuits. The MAX232 is a dual driver/receiver and typically converts the RX, TX, CTS and RTS signals. The drivers provide RS-232 voltage level outputs (approx. 7.5 V) from a single + 5 V supply via on-chip charge pumps and external capacitors. This makes it useful for implementing RS-232 in devices that otherwise do not need any voltages outside the 0 V to + 5 V range, as power supply design does not need to be made more complicated just for driving the RS-232 in this case. The receivers reduce RS-232 inputs (which may be as high as 25 V), to standard 5 V TTL levels. These receivers have a typical threshold of 1.3 V, and a typical hysteresis of 0.5 V.
Page 21
The diagram above, shows the expected waveform from the UART when using the common 8N1 format. 8N1 signifies 8 Data bits, No Parity and 1 Stop Bit. The RS-232 line, when idle is in the Mark State (Logic 1). A transmission starts with a start bit which is (Logic 0). Then each bit is sent down the line, one at a time. The LSB (Least Significant Bit) is sent first. A Stop Bit (Logic 1) is then appended to the signal to make up the transmission. The data sent using this method, is said to be framed. That is the data is framed between a Start and Stop Bit . RS-232 Voltage levels +3 to +25 volts to signify a "Space"(Logic0) -3 to -25 volts for a "Mark" (logic 1). Any voltage in between these regions (i.e. between +3 and -3 Volts) is undefined.
The data byte is always transmitted least-significant-bit first. The bits are transmitted at specific time intervals determined by the baud rate of the serial signal. This is the signal present on the RS-232 Port of your computer, shown below.
Page 22
FIG 6 MAX 232 1. MAX-232 includes a Charge Pump, which generates +10V and -10V from a single 5v supply. BAR -PRIMARY CTs
FIG 7 MAX 232 INTERFACING INTERFACING Sal Institute Of Technology & Engineering Research
Page 23
MAX232 (+5V -> +-12V converter) Serial port male 9 pin connector (SER)
A GSM modem can be an external device or a PC Card / PCMCIA Card. Typically, an external GSM modem is connected to a computer through a serial cable or a USB cable. A GSM modem in the form of a PC Card / PCMCIA Card is designed for use with a laptop computer. It should be inserted into one of the PC Card / PCMCIA Card slots of a laptop computer. Like a GSM mobile phone, a GSM modem requires a SIM card from a wireless carrier in order to operate. As mentioned in earlier sections of this SMS tutorial, computers use AT commands to control modems. Both GSM modems and dial-up modems support a common set of standard AT commands. You can use a GSM modem just like a dial-up modem. In addition to the standard AT commands, GSM modems support an extended set of AT commands. These extended AT commands are defined in the GSM standards. With the extended AT commands, you can do things like: Reading, writing and deleting SMS messages. Sending SMS messages. Monitoring the signal strength. Monitoring the charging status and charge level of the battery. Reading, writing and searching phone book entries.
The number of SMS messages that can be processed by a GSM modem per minute is very low -- only about six to ten SMS messages per minute.
Page 24
3.6 LED:
Fig. 9 LED
Page 25
3.7 LCD:-
Fig. 10 LCD Most projects you create with the controller CPU require some form of display. The most common way to accomplish this is with the LCD (Liquid Crystal Display). LCDs have become a cheap and easy way to get text display for an embedded system Common display are set up as 16 to 20 characters by 1 to 4 lines.
3.7.1 Pinout
FIG 11 LCD BLOCK DIAGRAM 8 data pins D7:D0 Bi-directional data/command pins. Alphanumeric characters are sent in ASCII format.
Page 26
R/W: Read or Write 0= Write, 1= Read E: Enable (Latch data) Used to latch the data present on the data pins. A high-to-low edge is needed to latch the data
VEE : contrast control NOTE: When writing to the display, data is transferred only on the high to low transition of this signal. However, when reading from the display, data will become available shortly after the low to high transition and remain available until the signal falls low again.
Page 27
3.7.4 Registers
The HD44780 has two 8-bit registers, an instruction register (IR) and a data register (DR). The IR stores instruction codes. The DR temporarily stores data to be written into DDRAM or CGRAM and temporarily stores data to be read from DDRAM or CGRAM. Data written into the DR is automatically written into DDRAM or CGRAM by an internal operation. . These two registers can be selected by the register selector (RS) signal. See the table below
RS 0 0 1 1 RW 0 1 0 1 Operation IR write as an internal operation (display clear, etc.) Read busy flag (DB7) and address counter (DB0 to DB6) DR write as an internal operation (DR to DDRAM or CGRAM) DR read as an internal operation (DDRAM or CGRAM to DR)
3.9
A variable regulated power supply, also called a variable bench power supply, is one where you can continuously adjust the output voltage to your requirements. Varying the output of the power supply is the recommended way to test a project after having double checked parts placement against circuit drawings and the parts placement guide.
Page 28
The LM7805 is simple to use. You simply connect the positive lead of your unregulated DC power supply (anything from 9VDC to 24VDC) to the Input pin, connect the negative lead to the Common pin and then when you turn on the power, you get a 5 volt supply from the Output pin.
Page 29
Page 30
4.2.1 LCD
4.2.2 LEDS
Page 31
When you use the Keil Software tools, the 89S52 project development cycle is roughly the same as for any software development project.
1. Create source files in C or assembly. 2. Compile or assemble source files. 3. Correct errors in source files. 4. Link object files from compiler and assembler. 5. Test linked application.
Page 32
Page 33
5.2.1 DESCRIPTION OF FLOW : A wireless certificate is issued to a mobile terminal, that is, a voter has the certificate before commencing voting. The certificate should be kept in the mobile terminal for evoting service. E-voting service is started as soon as a mobile terminal connects to an e-voting device. If an e-voting device accepts the e-voting service, it requests a certificate to verify a voters identity A mobile terminal sends the certificate to the e-voting device. So, a voter proves that he is a qualified person to cast a vote. If the voters identity is verified and the voter is given the right to vote, an e-voting device checks if the voter is re-accessing an e-voting device. The e-voting device selects and transmits an encryption key according to the encryption method to guarantee the confidentiality of the voter. Of course, this work is done after verifying the voters identity and checking double voting of a voter. After sending the encryption key, an e-voting device continuously transmits vote information containing a list of possible voting selections and supplemental information. And then, a voter decides his voting based on the vote information. A mobile terminal encrypts the vote content and transmits the encrypted vote content to an e-voting device. An e-voting device does not reveal the encrypted vote content until voting time is finished. At this moment, a mobile communication server that received the encrypted vote content and the ID of a mobile terminal always deletes ID. That is, an evoting device receives only content of voting. When voting time has passed, an e-voting device decrypts the stored encrypted vote content and checks the voting selection to count the vote.
Page 34
Electrical Voting Machine Using GSM 5.3 Coding Of Project :# include <8052.h> # include "lcd.h"
DisplayVersion();
main:
LcdInit(); LcdPuts("Enter your Vote: "); LcdCmd(NEW_LINE); while(1) { if(P1_0 == 0) { LcdCmd(NEW_LINE); LcdPuts("Party 1 : Voted "); for(j = 0; j < 10; j++) for(i = 0; i < 40000; i++); k++; LcdCmd(NEW_LINE); LcdPuts(" } if(P1_1 == 0) { LcdCmd(NEW_LINE); ");
Page 35
void DisplayVersion() { LcdInit(); LcdPuts("ELECTRONIC VOTING"); LcdCmd(NEW_LINE); LcdPuts("M/C USING 8051uC "); }
Page 37
Chapter 6 SECURITY
6.1 Security Features in GSM
GSM is a digital wireless network standard widely used in European and Asian countries. It provides a common set of compatible services and capabilities to all GSM mobile users. The services and security features to subscribers are subscriber identity confidentiality, subscriber identity authentication, user data confidentiality on physical connections, connectionless user data confidentiality and signaling information element confidentiality. They are summarized as follows: Subscriber identity confidentiality is the property that the subscriber's real identity remains secret by protecting his International Mobile Subscriber Identity(IMSI), which is an internal subscriber identity used only by the network, and using only temporary identities for visited networks. Subscriber identity authentication is the property that ensures that the mobile subscriber who is accessing the network or using the service is the one claimed. This feature is to protect the network against unauthorized use. Data confidentiality is the property that the user information and signaling data is not disclosed to unauthorized individuals, entities or processes. This feature is to ensure the privacy of the user information. In our proposed GSM mobile voting scheme, communication between the mobile equipment and the GSM network uses standard GSM technology. Hence GSM security features apply. Among which, the subscriber identity authentication feature is particularly used in the protocol. The subscriber identity authentication in GSM is based on a challenge response protocol. A random challenge RAND is issued when a mobile subscriber tries to access a visited network. The Authentication Centre (AC) computes a response SRES from RAND using an algorithm A3 under the control of a subscriber authentication key Ki, where the key Ki is unique to the subscriber, and is stored in the Subscriber Identity Module (SIM) on the Mobile Equipment (ME), as well as the Home Location Register (HLR).
Page 38
In a mobile environment, the mobile device have limited computational abilities, so employing schemes with large computation is not practical. Therefore, we develop our GSM mobile voting scheme based on a blind signature voting scheme presented by Fujioka et al. in 1992. It is a prototype system based on blind signatures. It was intended as a practical secret voting scheme for large scale elections. There are voters, an administrator, and a counter participating in the scheme. In this scheme, digital signature, blind signature and bitcommitment mechanisms were used. As these mechanisms are also the primitive cryptographic elements, in our proposed scheme a brief description of these mechanisms is given : Digital signature is an essential cryptographic primitive for authentication, authorization, and nonrepudiation. It binds a message and a secret known only to the signer in a way that the public can verify that the message has been signed by the signer without knowing the secret. In a public-key encryption based digital signature scheme, the secret is the private key, and the information that is used by the public to verify the signature is called the public key. Blind signature is a signature scheme with special functionality, where the signer has no knowledge of the message he signs and the signature. Hence, the signed message cannot be associated with the sender. A blind signature protocol usually includes three steps: blinding, signing and unblinding.
Page 39
Bit-commitment is the basic component of many cryptographic protocols. In a bitcommitment scheme, the sender A sends an encrypted message m to the receiver B in such a way that when later on A sends B the key to decrypt the message, B can be confident that it is the right key to the message m and the decrypted message B gets is the same message m that A committed to with B.
Page 40
Electrical Voting Machine Using GSM 6.4 Proposed Mobile Voting Scheme
In this section, we introduce our GSM mobile voting scheme. In this scheme, GSM is used for the voting system to introduce voter mobility and provide voter authentication. We start by introducing the different components of the scheme, followed by stating a list of assumptions on which the protocol is based. Then the proposed voting scheme is described in detail.
Mobile Equipment/Voting Device (ME): In electronic voting schemes, voters need to use
dedicated voting devices to cast their votes electronically, for instance, Internet connected computers or DRE machines. In our scheme, the voting device corresponds to the GSM mobile equipment (ME), which consists of a GSM SIM card . Authentication Centre (AC): AC is an entity within the GSM network. AC generates the authentication parameters and authenticates the mobile equipment . Verification Server (VS): VS belongs to the voting authority, who organizes the voting event. It verifies the legitimacy of the voter and issues a voting token to the voter . Collecting and Counting Server (CS): CS is the server that collects and counts the votes to give the final result. CS's action need to be audited by all candidate parties. Our system is based on a number of assumptions. We assume that the proposed Mobile Voting scheme is part of a voting system, and that voters can choose to vote through different methods, for example, the voting booth. If voters want to vote through Mobile, they have to be registered subscribers. This means that the voters have already registered their real names and addresses with their mobile operators by presenting their eligible credentials at the time of subscription. We assume that the Mobile operator is trusted to authenticate the mobile users for the purpose of voting and send the correct information to VS and CS.
Page 41
In this section, we discuss how and to what extent the protocol fulfils the security requirements. Authentication Only the authorized voters can vote. First, voters are authenticated through GSM, which assures that voters are who they claim to be. The authentication of the voter is as good as Mobile Service provider or GSM can provide. Second, the eligibility of voters is checked by VS. This prevents voters from voting more than once. Privacy All votes remain secret while the voting takes place and each individual vote cannot be linked to the voter who casts it. The proposed scheme is divided into three phases, and they are separated in time. In the voting phase, a blind signature is applied to the vote in a way that vote is not linkable with voter and is signed by the AC without revealing the vote and in the same way it is signed by the VS.
In the next step the communication between voters and CS achieves anonymity with the help of AC. The voter V i sends the vote encrypted with CS's public key kCS to AC, so the AC is not able to reveal vote v i. Also, CS has no direct communication with voter Vi, so CS cannot tell which voter casts the vote. Hence, for all the components of the voting system, if the Voters cannot be linked with the vote vi, the privacy of the voter is protected.
Page 43
6.9 Cryptography
Cryptography is the practice and study of hiding information. Modern cryptography intersects the disciplines of mathematics, computer science, and engineering. Applications of cryptography include ATM cards, computer passwords, and electronic commerce.
Cryptology prior to the modern age was almost synonymous with encryption, the conversion of information from a readable state to nonsense. The sender retained the ability to decrypt the information and therefore avoid unwanted persons being able to read it. Since WWI and the advent of the computer, the methods used to carry out cryptology have become increasingly complex and its application more widespread.
Alongside the advancement in cryptology-related technology, the practice has raised a number of legal issues, some of which remain unresolved.Until modern times cryptography referred almost exclusively to encryption, which is the process of converting ordinary information (plaintext) into unintelligible gibberish (i.e., ciphertext). Decryption is the reverse, in other words, moving from the unintelligible ciphertext back to plaintext. A cipher (or cypher) is a pair of algorithms that create the encryption and the reversing decryption.
The detailed operation of a cipher is controlled both by the algorithm and in each instance by a key. This is a secret parameter (ideally known only to the communicants) for a specific message exchange context. Keys are important, as ciphers without variable keys can be trivially broken with only the knowledge of the cipher used and are therefore useless (or even counter-productive) for most purposes. Historically, ciphers were often used directly for encryption or decryption without additional procedures such as authentication or integrity checks.
Page 44
In colloquial use, the term "code" is often used to mean any method of encryption or concealment of meaning. However, in cryptography, code has a more specific meaning. It means the replacement of a unit of plaintext (i.e., a meaningful word or phrase) with a code word (for example, wallaby replaces attack at dawn). Codes are no longer used in serious cryptographyexcept incidentally for such things as unit designations (e.g., Bronco Flight or Operation Overlord)since properly chosen ciphers are both more practical and more secure than even the best codes and also are better adapted to computers.
Cryptanalysis is the term used for the study of methods for obtaining the meaning of encrypted information without access to the key normally required to do so; i.e., it is the study of how to crack encryption algorithms or their implementations.
Some use the terms cryptography and cryptology interchangeably in English, while others (including US military practice generally) use cryptography to refer specifically to the use and practice of cryptographic techniques and cryptology to refer to the combined study of cryptography and cryptanalysis. English is more flexible than several other languages in which cryptology (done by cryptologists) is always used in the second sense above.
The study of characteristics of languages which have some application in cryptography (or cryptology), i.e. frequency data, letter combinations, universal patterns, etc., is called crypto linguistics.
We have planned to make a secured mobile application in Java2Me which will encrypt vote content and following will be decrypted in controller and identity will be deleted
Page 45
Chapter 8 CONCLUSION
The project GSM BASED ELECTRICAL VOTING MACHINE has been successfully designed and tested. It has been developed by integrating features of all the hardware components used. Presence of every module has been reasoned out and placed carefully thus contributing to the best working of the unit. Secondly, using highly advanced ICs and with the help of growing technology the project has been successfully implemented. We proposed a mobile voting scheme, where the Mobile service provider authentication infrastructure is used to provide voter authentication and improve voter mobility. Authentication is always a difficult requirement to fulfill for remote voting schemes, most of which apply a public-key based signature scheme for voter authentication. Our scheme also enhances the security and provides more mobility and convenience to voters. Where the voters privacy is protected by applying a blind signature scheme.
FUTURE EXPANSION
In future if mobile device are provided with finger print sensor than identification of voter can be done in full secured way and voting process can be done in easiest way.
Page 47
Chapter.9 BIBLIOGRAPHY
1) The 8051 Micro controller and Embedded Systems -Muhammad Ali Mazidi Janice Gillispie Mazidi 2) The 8051 Micro controller Architecture, Programming & Applications -Kenneth J.Ayala 3) Fundamentals Of Micro processors and Micro computers -B.Ram 4) Micro processor Architecture, Programming & Applications -Ramesh S.Gaonkar 5) Electronic Components -D.V.Prasad 6) Wireless Communications - Theodore S. Rappaport 7) Mobile Tele Communications - William C.Y. Lee
Page 48