Sei sulla pagina 1di 26

MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE

CRYPTOGRAPHY

CHAPTER 1
INTRODUCTION

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 1


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

1. INTRODUCTION

This chapter gives the brief overview of voting system used earlier and newly
developed systems for it which overcomes the drawback of former ones. It also elaborates the
solutions for security using ECC. The overall flow of the entire project report is then given
for visualization and better understanding of project.

1.1 BACKGROUND

The background description are provided herein is for the purpose of presenting the
context of the project. Electronic Voting Systems (EVMs) are a subset of available electronic
voting technologies. Their introduction has not followed the typical pattern in which
technology is first taken up in the technologically-developed world, and then later adopted by
less developed countries. Instead the trend appears to move in the opposite direction,
whereby EVMs have been taken up in some poorer countries, but wealthier, more established
democracies have often rejected their use. Among less developed countries, there is a
tendency to use EVMs without sophisticated and costly transparency mechanisms, such as
voter-verified paper audit trails (which give the voter a paper record of their vote choice).

However, these existing system have to face severe disadvantages such as time
consumption during voting process, vulnerable security issues, inconvenience for migrated
people (voter). So the proposed system provides an optimized solution for security issues by
using Elliptic Curve Cryptography for encryption of vote to send as SMS through Mobile. It
offers a previously unattainable level of security and feasibility in voting process.

Fig. 1.1 Electronic Voting Machine (EVM)

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 2


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

1.2 RELEVENCE

There are large numbers of solutions in battle management system. All these solutions
critically operate for situation awareness. But most of them suffer from lot of drawbacks
mentioned above. The proposed system of Modified EVM for Secure Mobile Voting
overcomes most of the drawbacks using ECC technique. The designed system for Mobile
Voting are fast and efficient to give solutions for conventional electronic voting system
without above mentioned drawbacks.

This project generally pertains to mobile voting system using ECC algorithm. In this
system the android based application will be developed. Then user’s vote will be encrypted
using this application and will be sent to the number provided by election commission.

1.3 ORGANISATION OF THE PROJECT

Chapter 1 “INTRODUCTION” gives brief description of this work. It sets scope for
discussion in the report. The concept is introduced in this chapter giving background and
relevance in present scenario.

Chapter 2 “LITERATURE SURVEY” contains the information of main components


without which the system cannot work. It includes survey of existing battle management
systems and algorithms for image stitching.

Chapter 3 “ABOUT THE PROJECT” discusses the hardware and software design and
their detailed description.

1.4 SUMMARY

It contains introductory information about the image stitching process and algorithms
for it and how the productivity will improve using which algorithm. All the chapter contents
are discussed in brief which gives a superficial idea about the project report.

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 3


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

CHAPTER 2

LITERATURE SURVEY

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 4


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

2. LITERATURE SURVEY

2.1 INTRODUCTION

To meet the requirements of the project, the survey is carried out for the well
functioning of the system. The survey was carried out for Electronic Voting System.

2.2 SURVEY OF EXISTING SYSTEMS

There are various systems available for voting such as Ballot Voting System,
Electronic Voting Systems. These are explained as follows-

2.2.1 BALLOT VOTING SYSTEM

BALLOT PAPERS & SYMBOLS

After nomination of candidates is complete, a list of competing candidates is prepared


by the Returning Officer, and ballot papers are printed. Ballot papers are printed with the
names of the candidates (in languages set by the Election Commission) and the symbols
allotted to each of the candidates. Candidates of recognised Parties are allotted their Party
symbols. Some electors, including members of the armed forces or government of India.

Fig 1:Ballot Papers & Symbols

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 5


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

HOW THE VOTING TAKES PLACE?

Voting is by secret ballot. Polling stations are usually set up in public institutions,
such as schools and community halls. To enable as many electors as possible to vote, the
officials of the Election Commission try to ensure that there is a polling station within 2km of
every voter, and that no polling stations should have to deal with more than 1200 voters. Each
polling station is open for at least 8 hours on the day of the election.

On entering the polling station, the elector is checked against the Electoral Roll, and allocated
a ballot paper. The elector votes by marking the ballot paper with a rubber stamp on or near
the symbol of the candidate of his choice, inside a screened compartment in the polling
station. The voter then folds the ballot paper and inserts it in a common ballot box which is
kept in full view of the Presiding Officer and polling agents of the candidates. This marking
system eliminates the possibility of ballot papers being surreptitiously taken out of the polling
station or not being put in the ballot box.

Fig 2:Ballot Box

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 6


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

DISADAVANTAGES:

1.Time Consuming: This system is very much time consuming and slow. As only
one person can vote at a time and all the voters has to wait in the queue for their turn,
which in turn increases the crowd at the polling station.

2. Booth Capture: It was the major type of electoral fraud found in India, wherein
the polling station was taken over by the party loyalists. Better policing makes such
attacks less of a threat today.

3.Low Tally Speed: Once the voting schedule is over, the result of the election cannot
be declared immediately. All the ballot boxes are collected at a specific location and
then the counting of the votes is carried out which is very much time consuming.

2.2.2ELECTRONIC VOTING SYSTEM (EVM)

An electronic voting system is a type of voting system which uses electronic ballot
that would allow voters to broadcast their secret vote ballot to election officials over the
internet. With the prosperity of internet over the years, inventers start to make the use of
electronic voting in order to make the voting process more convenient and to raise the
participation of the civic. From now on, engineers have repeatedly created new technology to
improve the feasibility of electronic voting system.

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 7


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

Figure 1: Indian EVMs consist of a BALLOT UNIT used by voters (left) and a CONTROL UNIT operated by
poll workers (right) joined by a 5-meter cable. Voters simply press the button corresponding to the candidate
of their choice. We obtained access to this EVM from an anonymous source.

ELECTRONIC VOTING IN INDIA

The Election Commission of India developed the country’s EVMs in partnership with
two government-owned companies, the Electronics Corporation of India (ECIL) and Bharat
Electronics Limited (BEL). Though these companies are owned by the Indian government,
they are not under the administrative control of the Election Commission. They are profit-
seeking vendors that are attempting to market EVMs globally.The first Indian EVMs were
developed in the early 1980s by ECIL. They were used in certain parts of the country, but
were never adopted nationwide. They introduced the style of system used to this day (see
Figure 1), including the separate control and ballot units and the layout of both components.
These first-generation EVMs were based on Hitachi 6305 microcontrollers and used
firmware stored in external UV-erasable PROMs along with 64kb EEPROMs for storing
votes. Second-generation models were introduced in 2000 by both ECIL and BEL. These
machines moved the firmware into the CPU and upgraded other components. They were

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 8


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

gradually deployed in greater numbers and used nationwide beginning in 2004. In 2006, the
manufacturers adopted a third-generation design incorporating additional changes suggested
by the Election Commission.

Figure 2: Counting Votes—The EVM records votes in its internal memory. At a public counting session,
workers remove a seal on the control unit and press the RESULT I button (left) to reveal the results. The
machine sequentially outputs the number of votes received by each candidate using a bank of 7-segment
LEDs (right). Here, candidate number 01 has received 7 votes.

According to Election Commission statistics, there were 1,378,352 EVMs in use in July
2009. Of these, 448,000 were third-generation machines manufactured from 2006 to 2009,
with 253,400 from BEL and 194,600 from ECIL. The remaining 930,352 were the second-
generation models manufactured from 2000 to 2005, with 440,146 from BEL and 490,206
from ECIL. (The first generation machines are deemed too risky to use in national elections
because their 15-year service life has expired, though they are apparently still used in certain
state and local contests.) In the 2009 parliamentary election, there were 417,156,494 votes
cast, for an average of 302 votes per machine. The EVM we tested is from the largest group,
a second-generation ECIL model. It is a real machine that was manufactured in 2003, and it
has been used in national elections. It was provided by a source who has requested to remain
anonymous. Photographs of the machine and its inner workings appear throughout this paper.
Other types and generations of machines have certain differences, but their overall operation
is very similar. We believe that most of our security analysis is applicable to all EVMs now
used in India.

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 9


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

EVM OPERATION AND ELECTION PROCEDURES


India’s EVMs have two main components, shown in Figure 1. There is a CONTROL
UNIT, used by poll workers, which stores and accumulates votes, and a BALLOT UNIT,
located in the election booth, which is used by voters. These units are connected by a 5 m
cable, which has one end permanently fixed to the ballot unit. The system is powered by a
battery pack inside the control unit. The EVMs are designed for one- or two-race elections, as
are typical in India; we describe single-race operation here. The ballot unit has 16 candidate
buttons. If any are unused, they are covered with a plastic masking tab inside the unit. When
there are more than 16 candidates, an additional ballot unit can be connected to a port on the
underside of the first ballot unit. Up to four ballot units can be chained together in this way,
for a maximum of 64 candidates. A four-position slide switch under the ballot unit door
selects the unit’s position in the chain. Election procedures are described in a number of
public documents. Prior to the election, workers set up the ballot unit by attaching a paper
label that shows the names of the candidates and their party symbols (to aid illiterate voters)
next to the candidate buttons. After sealing the label under a plastic door, workers configure
the number of candidates using a CAND SET button on the control unit. On the morning of
the election, poll workers perform a small mock election to test the machine. They then
publicly set the totals to zero by pressing the CLEAR button, after which the control unit
display shows that a total of zero votes have been cast. Workers can check this count at any
time by pressing the TOTAL button. Seals are then placed on various parts of the control unit
to block access to counting and clearing functions until later in the election process. When a
voter arrives, workers verify his or her identity and record the voter’s presence by obtaining a
signature or thumb print. To prevent double voting, they mark the voter’s right index finger
with indelible ink. Next, a poll worker presses the BALLOT button on the control unit to
allow one vote. This causes a green READY light to glow on the ballot unit. The voter enters
the polling booth and presses the button for the candidate of his or her choice. A red light next
to the candidate button glows, the ready light turns off, and the control unit emits a loud beep
to indicate that the vote has been cast. The red light then turns off automatically. This process
repeats for each voter. At the end of the poll, the presiding officer removes a plastic cap on
the control unit and presses the CLOSE button, which prevents the EVM from accepting
further votes. The ballot unit is disconnected and the control unit is placed in storage until the
public count, which may occur weeks later. On the counting day, the control units are
delivered to a counting center. In public view, an election official breaks a seal on the control

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 10


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

unit and presses the RESULT I button, shown in Figure 2. The display on the control unit
shows a sequence of outputs: the number of candidates, the total votes, and the number of
votes received by each candidate. Officials manually record the totals from each machine and
add them together to determine the election result. The machines are then placed in storage
until the next election.

DISADVANTAGES :

1. Complexity: The designing phase of this system is highly complex. As the system has
deal with large no of users and has to maintain huge database
2. Security Issues: The whole system operates over the internet which makes the system
more susceptible to online threats so the security issue is the main concern of this
system.

3.High Expense: This system is very much costlier than the other systems because
various equipments and utilities are required to be purchased which are quite costlier.

2.3 MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ECC

In democratic country like India Election and voting is an integral part of all the
citizens.The chances of dummy voting are more if the voter is not authenticated
properly.Voter who is not able present at his registered place cannot vote.Voter should be
present at election booth at the time of voting.Our aim is to develop the android based
application for encryption purpose. Voter can vote using Smartphone. Encrypted SMS will be
sent to voter ID server via GSM. Voter ID part will be decrypted & vote part will be sent to
voting machine. EVM will store decrypted vote details. Winner will be shown on PC.

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 11


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

WHY ELLIPTIC CURVE CRYPTOGRAPHY (ECC) ?

METHOD 1: ENCRYPTION USING ECC, ECDH AND AES-128


TABLE 1

Encryption Text Encryption time (millisecond)


algorithm length 160 192 224 256
(byte) Bit bit bit bit
ECC 6 282 341 395 470
ECDH / 60 5080 7671 11214 14999
AES-128
Total 5362 8012 11609 15469

METHOD 2: ENCRYPTION USING ECC


TABLE II

Encryption Text Encryption time (millisecond)


algorithm length 160 192 224 256
(byte) bit bit bit bit
ECC 6 282 341 395 470
ECC 60 1406 1741 2207 3097
Total 1688 2086 2602 3567

Based on our research, the time taken to encrypt this message is provided in table 1
and 2 (in millisecond). Those tables provide the performance with an ECC cryptographic
algorithm, whose domain parameters follow the ones specified, namely: secp160r1,
secp192r1, secp224r1 and secp256r1 for 160-bit, 192-bit, 224-bit and 256-bit respectively.

In both tables, the 6-byte text is encrypted using the same ECC scheme, while the 60
byte text is encrypted using the different scheme. The time taken to generate digital signature
is not shown since it is the same between those two methods.

In table 1, the message is encrypted using hybrid encryption, that is, there is key
agreement in ECDH scheme which the ECC shared secret key is used to encrypt a symmetric
algorithm key (in this case AES-128-bit). The message itself is encrypted using this
symmetric key.

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 12


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

Therefore, the data provided in the table includes time to:


• generate AES key
• encrypt AES key with ECC shared secret key
• decrypt AES key with ECC shared secret key
• encrypt message with AES key

In table 2, the data is directly encrypted with shared ECC key.

Both methods in table 1 and table 2 use 160, 192, 224and 256-bit ECC and, in
addition, method 1 also uses 128bit AES as the minimum key size specified [22] which is
equivalent to 256 bit ECC. So, in the case of 256-bit ECC, there is no difference in term of
security level of using this symmetric algorithm. In general, it is shown that table 2 has less
time to encrypt the same data size than the one in table 1. By using 256-bit ECC to encrypt 60
byte message, method 1 needs about 15 seconds, while method 2 is about 3 seconds which is
about 1/5 of method 1. The other ECCs’ key size are for data comparison, thought they
provide different security levels from AES-128 bit.

ADVANTAGES:

1. Modified EVM has improvement in terms of speed over conventional EVM.


2. Accuracy is improved in this ECC algorithm.
3. Increase in security of voting.
4. Less time consuming.
5. Android application does it feasibly as most of the people using android OS
smartphones.

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 13


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

CHAPTER 3
DESIGN AND DRAWING

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 14


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

3. ABOUT THE PROJECT

3.1 INTRODUCTION

The chapter shall discuss the design aspects of the project. It includes the criteria on
which the required algorithms were selected, the process algorithm, flowchart and its
description.

3.2 OBJECTIVE

To design and build a modified EVM which would provide both means of voting i.e.
Booth Voting using modified EVM (Electronic Voting Machine) and e-Voting using mobile
phones (Mobile Voting System) by developing android application for smartphone.

3.3 BLOCK DIAGRAM:

Smart-
Phone LCD

Buzzer
Common PIC
Server Micrco-
PC ntroller
LEDs
GSM RS232
Module Serial
Serial Bus
4x4
Bus
Keyboard

Administrator Modified EVM

Fig. 3.1 Block diagram

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 15


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

3.4 BLOCK DIAGRAM DESCRIPTION

As shown in Fig.3.1, the block diagram consists of 4 modules:

3.4.1 Smartphone:

• An android application will be developed for encryption of user’s vote and voter ID
using Elliptic Curve Cryptography algorithm.
• Voter will send this cipher text to the number provided by Election Commission.

3.4.2 GSM Module:

• GSM module will be connected to the common server using RS232 serial bus.
• It will receive the cipher text sent from smartphone by the user.

3.4.3 Administrator:

• Administrator is nothing but a PC acting as a common server. It stores all the database
of voters.
• The voter authentication will be done by administrator.

3.4.4 Modified EVM:

• The manual voting will be done using this module.


• Modified EVM will be consisting of..
– PIC microcontroller
– 4 x 4 keypad
– LCD, LED’s
– Buzzer interfaced with microcontroller.

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 16


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

3.5 ALGORITHM:

3.5.1 ALGORITHM FOR MOBILE VOTING:

1. The voter will send his Voter ID to the Administrator.


2. Administrator will check its validity and checks whether voting has already been done
from this Voter ID or not.
3. If both conditions satisfy, then it will ask the voter to send one of the combination in the
matrix on the card provided to the voter.
4. The voter will send the corresponding code to the administrator.
5. Administrator will verify that code from its database and if verified, it will send the list of
candidates to the user.
6. The voter then encrypts the vote using Android App. The process is as follows:
7. The vote will be first encrypted with the administrator’s Public Key.
8. This cipher text is then signed with the user’s Voter ID(say 5 digit).
9. This whole text will be encrypted again with the voter’s private key.
10. This cipher text will be sent to the administrator. Once receiving the vote, the
administrator checks its validity by decrypting the cipher text by using the Private Key
linked with the mobile number from which the SMS received.
11. Counter will then decrypt that SMS using the public key.
12. Counter will send acknowledgment to the administrator.
13. The administrator confirms the voting and forwards the acknowledgment to the user.

3.5.2 ALGORITHM FOR MANUAL VOTING:

1. Voter has to enter his voter ID using keypad.


2. The Modified EVM will send this voter ID to Common Server which will check its
validity and checks that whether voting has already been done from this voter ID or not.
3. If not, then it will allow voter to cast his vote else not.
4. After successful voting, Administrator will confirm the voting and will update the list of
voters.

The outputs of both these systems will be maintained on common server.

3.6 FLOWCHART:

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 17


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 18


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 19


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 20


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

3.6 SOFTWARE DESIGN

The algorithm mentioned above such as ECC(Elliptic Curve Cryptography), Voter


authentication can be implemented using software like Eclipse IDE, Visual Basic, MS Access
and Keil compiler.

The algorithms are explained as follows:

3.5.1 ECC ALGORITHM:

Elliptical curve cryptography (ECC) is a public key encryption technique based


on elliptic curve theory that can be used to create faster, smaller, and more efficient
cryptographic keys. ECC generates keys through the properties of the elliptic curve equation
instead of the traditional method of generation as the product of very large prime numbers.
The technology can be used in conjunction with most public key encryption methods, such as
RSA, and Diffie-Hellman. According to some researchers, ECC can yield a level of security
with a 164-bit key that other systems require a 1,024-bit key to achieve. Because ECC helps
to establish equivalent security with lower computing power and battery resource usage, it is
becoming widely used for mobile applications. ECC was developed by Certicom, a mobile e-
business security provider, and was recently licensed by Hifn, a manufacturer of integrated
circuitry (IC) and network security products. RSA has been developing its own version of
ECC. Many manufacturers, including 3COM, Cylink, Motorola, Pitney Bowes, Siemens,
TRW, and VeriFone have included support for ECC in their products.

The properties and functions of elliptic curves have been studied in mathematics for
150 years. Their use within cryptography was first proposed in 1985, (separately) by Neal
Koblitz from the University of Washington, and Victor Miller at IBM. An elliptic curve is not
anellipse (oval shape), but is represented as a looping line intersecting two axes (lines on a
graph used to indicate the position of a point). ECC is based on properties of a particular type
of equation created from the mathematical group (a set of values for which operations can be
performed on any two members of the group to produce a third member) derived from points
where the line intersects the axes. Multiplying a point on the curve by a number will produce
another point on the curve, but it is very difficult to find what number was used, even if you
know the original point and the result. Equations based on elliptic curves have a characteristic

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 21


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

that is very valuable for cryptography purposes: they are relatively easy to perform, and
extremely difficult to reverse.

The industry still has some reservations about the use of elliptic curves. Nigel Smart,
a Hewlett Packard researcher, discovered a flaw in which certain curves are extremely
vulnerable. However, Philip Deck of Certicom says that, while there are curves that are
vulnerable, those implementing ECC would have to know which curves could not be used.
He believes that ECC offers a unique potential as a technology that could be implemented
worldwide and across all devices. According to Deck (quoted in Wired), "the only way you
can achieve that is with elliptic curve."

3.5.2 VISUAL BASIC:

It's a computer programming system developed and owned by Microsoft. Visual Basic
was originally created to make it easier to write programs for the Windows computer
operating system. The basis of Visual Basic is an earlier programming language called
BASIC that was invented by Dartmouth College professors John Kemeny and Thomas Kurtz.
Visual Basic is often referred to using just the initials, VB. Visual Basic is easily the most
widely used computer programming system in the history of software.

3.5.3 MS ACCESS:

Microsoft Access, also known as Microsoft Office Access, is a database management


system from Microsoft that combines the relational Microsoft Jet Database Engine with
a graphical user interface and software-development tools. It is a member of the Microsoft
Office suite of applications, included in the Professional and higher editions or sold
separately.

Microsoft Access stores data in its own format based on the Access Jet Database
Engine. It can also import or link directly to data stored in other applications and databases.

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 22


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

3.5.4 ECLIPSE IDE:

Eclipse is a multi-language Integrated development environment (IDE) comprising a


base workspace and an extensible plug-in system for customizing the environment. It is
written mostly in Java. It can also be used to develop packages for the software Mathematical
Development environments include the Eclipse Java development tools (JDT) for Java and
Scala, Eclipse CDT for C/C++ and Eclipse PDT for PHP, among others.

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 23


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

CHAPTER 4
CONCLUSION AND FUTURE SCOPE

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 24


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

4.1 CONCLUSION:

For developing secure voting system, previous voting systems were compared and
analyzed the requirements for the security norms. The system with Modified EVM for Secure
Mobile Voting using ECC is designed. It is found that this system has improvements in terms
of security, speed, accuracy, feasibility.

4.2 FUTURE SCOPE:

Encryption of data transferred between two parties in amobile environment is a


critical part in keeping data security, especially for its confidentiality and integrity .However,
achieving high security level by demanding high computing cost is not the solution. In this
paper, we have proposed to use ECC for directly encrypting data in a specified size in the
mobile devices. Encryption in a mobile device itself is slightly difference from other
machines since it needs to consider its resource limitation.

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 25


MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ELLIPTICAL CURVE
CRYPTOGRAPHY

REFERENCES:

[1]S.P Everett, K. K. Greene, M. D. Byrne, D. S. Wallach, K. Derr. D. Sandler, and T. Torous,


"Electronic voting machines versus traditional methods: improved preference, similar
performance,"Proc. the twenty-sixth annual SIGCHI conference on Human factors in
computing systems, ACM, April 2008.
[2] A. H. Trechsel and F. Breuer, "Voting: E-voting in the 2005 local elections in Estonia and
the broader impact for future e-voting projects," Proc. the 2006international conference on
Digital government research, ACM, 2006, pp. 40-41.
[3] BuddeComm, "Global - Mobile - Subscriber Statistics," [on-line]accessed on April 13,
2009 from http://www.budde.com.au/.
[4] B. I. Simidchieva, M. S. Marzilli, L. A. Clarke, and L. J.Osterweil, "Specifying and
verifying requirements for election processes," Proc. the 2008 international conference on
Digital government research, Digital Government Society of North America, 2008.
[5] M. Volkamer and M. McGaley, "Requirements and Evaluation Procedures for eVoting,"
Proc. The second international conference on Availability, reliability and security, IEEE,
2007,pp. 895-902.
[6] J. Camenisch, T. Groß, and T. S., "Rethinking Accountable Privacy Supporting Services,"
Proc. the 4th ACM workshop on Digital identity management, Fairfax, Virginia, USA, ACM,
2008,pp. 1-8.

SCOE ELECTRONICS & TELECOMMUNICATION ENGINEERING 2013-14 PAGE 26

Potrebbero piacerti anche