Evm Using Ecc
Evm Using Ecc
CRYPTOGRAPHY
CHAPTER 1
INTRODUCTION
1. INTRODUCTION
This chapter gives the brief overview of voting system used earlier and newly
developed systems for it which overcomes the drawback of former ones. It also elaborates the
solutions for security using ECC. The overall flow of the entire project report is then given
for visualization and better understanding of project.
1.1 BACKGROUND
The background description are provided herein is for the purpose of presenting the
context of the project. Electronic Voting Systems (EVMs) are a subset of available electronic
voting technologies. Their introduction has not followed the typical pattern in which
technology is first taken up in the technologically-developed world, and then later adopted by
less developed countries. Instead the trend appears to move in the opposite direction,
whereby EVMs have been taken up in some poorer countries, but wealthier, more established
democracies have often rejected their use. Among less developed countries, there is a
tendency to use EVMs without sophisticated and costly transparency mechanisms, such as
voter-verified paper audit trails (which give the voter a paper record of their vote choice).
However, these existing system have to face severe disadvantages such as time
consumption during voting process, vulnerable security issues, inconvenience for migrated
people (voter). So the proposed system provides an optimized solution for security issues by
using Elliptic Curve Cryptography for encryption of vote to send as SMS through Mobile. It
offers a previously unattainable level of security and feasibility in voting process.
1.2 RELEVENCE
There are large numbers of solutions in battle management system. All these solutions
critically operate for situation awareness. But most of them suffer from lot of drawbacks
mentioned above. The proposed system of Modified EVM for Secure Mobile Voting
overcomes most of the drawbacks using ECC technique. The designed system for Mobile
Voting are fast and efficient to give solutions for conventional electronic voting system
without above mentioned drawbacks.
This project generally pertains to mobile voting system using ECC algorithm. In this
system the android based application will be developed. Then user’s vote will be encrypted
using this application and will be sent to the number provided by election commission.
Chapter 1 “INTRODUCTION” gives brief description of this work. It sets scope for
discussion in the report. The concept is introduced in this chapter giving background and
relevance in present scenario.
Chapter 3 “ABOUT THE PROJECT” discusses the hardware and software design and
their detailed description.
1.4 SUMMARY
It contains introductory information about the image stitching process and algorithms
for it and how the productivity will improve using which algorithm. All the chapter contents
are discussed in brief which gives a superficial idea about the project report.
CHAPTER 2
LITERATURE SURVEY
2. LITERATURE SURVEY
2.1 INTRODUCTION
To meet the requirements of the project, the survey is carried out for the well
functioning of the system. The survey was carried out for Electronic Voting System.
There are various systems available for voting such as Ballot Voting System,
Electronic Voting Systems. These are explained as follows-
Voting is by secret ballot. Polling stations are usually set up in public institutions,
such as schools and community halls. To enable as many electors as possible to vote, the
officials of the Election Commission try to ensure that there is a polling station within 2km of
every voter, and that no polling stations should have to deal with more than 1200 voters. Each
polling station is open for at least 8 hours on the day of the election.
On entering the polling station, the elector is checked against the Electoral Roll, and allocated
a ballot paper. The elector votes by marking the ballot paper with a rubber stamp on or near
the symbol of the candidate of his choice, inside a screened compartment in the polling
station. The voter then folds the ballot paper and inserts it in a common ballot box which is
kept in full view of the Presiding Officer and polling agents of the candidates. This marking
system eliminates the possibility of ballot papers being surreptitiously taken out of the polling
station or not being put in the ballot box.
DISADAVANTAGES:
1.Time Consuming: This system is very much time consuming and slow. As only
one person can vote at a time and all the voters has to wait in the queue for their turn,
which in turn increases the crowd at the polling station.
2. Booth Capture: It was the major type of electoral fraud found in India, wherein
the polling station was taken over by the party loyalists. Better policing makes such
attacks less of a threat today.
3.Low Tally Speed: Once the voting schedule is over, the result of the election cannot
be declared immediately. All the ballot boxes are collected at a specific location and
then the counting of the votes is carried out which is very much time consuming.
An electronic voting system is a type of voting system which uses electronic ballot
that would allow voters to broadcast their secret vote ballot to election officials over the
internet. With the prosperity of internet over the years, inventers start to make the use of
electronic voting in order to make the voting process more convenient and to raise the
participation of the civic. From now on, engineers have repeatedly created new technology to
improve the feasibility of electronic voting system.
Figure 1: Indian EVMs consist of a BALLOT UNIT used by voters (left) and a CONTROL UNIT operated by
poll workers (right) joined by a 5-meter cable. Voters simply press the button corresponding to the candidate
of their choice. We obtained access to this EVM from an anonymous source.
The Election Commission of India developed the country’s EVMs in partnership with
two government-owned companies, the Electronics Corporation of India (ECIL) and Bharat
Electronics Limited (BEL). Though these companies are owned by the Indian government,
they are not under the administrative control of the Election Commission. They are profit-
seeking vendors that are attempting to market EVMs globally.The first Indian EVMs were
developed in the early 1980s by ECIL. They were used in certain parts of the country, but
were never adopted nationwide. They introduced the style of system used to this day (see
Figure 1), including the separate control and ballot units and the layout of both components.
These first-generation EVMs were based on Hitachi 6305 microcontrollers and used
firmware stored in external UV-erasable PROMs along with 64kb EEPROMs for storing
votes. Second-generation models were introduced in 2000 by both ECIL and BEL. These
machines moved the firmware into the CPU and upgraded other components. They were
gradually deployed in greater numbers and used nationwide beginning in 2004. In 2006, the
manufacturers adopted a third-generation design incorporating additional changes suggested
by the Election Commission.
Figure 2: Counting Votes—The EVM records votes in its internal memory. At a public counting session,
workers remove a seal on the control unit and press the RESULT I button (left) to reveal the results. The
machine sequentially outputs the number of votes received by each candidate using a bank of 7-segment
LEDs (right). Here, candidate number 01 has received 7 votes.
According to Election Commission statistics, there were 1,378,352 EVMs in use in July
2009. Of these, 448,000 were third-generation machines manufactured from 2006 to 2009,
with 253,400 from BEL and 194,600 from ECIL. The remaining 930,352 were the second-
generation models manufactured from 2000 to 2005, with 440,146 from BEL and 490,206
from ECIL. (The first generation machines are deemed too risky to use in national elections
because their 15-year service life has expired, though they are apparently still used in certain
state and local contests.) In the 2009 parliamentary election, there were 417,156,494 votes
cast, for an average of 302 votes per machine. The EVM we tested is from the largest group,
a second-generation ECIL model. It is a real machine that was manufactured in 2003, and it
has been used in national elections. It was provided by a source who has requested to remain
anonymous. Photographs of the machine and its inner workings appear throughout this paper.
Other types and generations of machines have certain differences, but their overall operation
is very similar. We believe that most of our security analysis is applicable to all EVMs now
used in India.
unit and presses the RESULT I button, shown in Figure 2. The display on the control unit
shows a sequence of outputs: the number of candidates, the total votes, and the number of
votes received by each candidate. Officials manually record the totals from each machine and
add them together to determine the election result. The machines are then placed in storage
until the next election.
DISADVANTAGES :
1. Complexity: The designing phase of this system is highly complex. As the system has
deal with large no of users and has to maintain huge database
2. Security Issues: The whole system operates over the internet which makes the system
more susceptible to online threats so the security issue is the main concern of this
system.
3.High Expense: This system is very much costlier than the other systems because
various equipments and utilities are required to be purchased which are quite costlier.
2.3 MODIFIED EVM FOR SECURE MOBILE VOTING SYSTEM USING ECC
In democratic country like India Election and voting is an integral part of all the
citizens.The chances of dummy voting are more if the voter is not authenticated
properly.Voter who is not able present at his registered place cannot vote.Voter should be
present at election booth at the time of voting.Our aim is to develop the android based
application for encryption purpose. Voter can vote using Smartphone. Encrypted SMS will be
sent to voter ID server via GSM. Voter ID part will be decrypted & vote part will be sent to
voting machine. EVM will store decrypted vote details. Winner will be shown on PC.
Based on our research, the time taken to encrypt this message is provided in table 1
and 2 (in millisecond). Those tables provide the performance with an ECC cryptographic
algorithm, whose domain parameters follow the ones specified, namely: secp160r1,
secp192r1, secp224r1 and secp256r1 for 160-bit, 192-bit, 224-bit and 256-bit respectively.
In both tables, the 6-byte text is encrypted using the same ECC scheme, while the 60
byte text is encrypted using the different scheme. The time taken to generate digital signature
is not shown since it is the same between those two methods.
In table 1, the message is encrypted using hybrid encryption, that is, there is key
agreement in ECDH scheme which the ECC shared secret key is used to encrypt a symmetric
algorithm key (in this case AES-128-bit). The message itself is encrypted using this
symmetric key.
Both methods in table 1 and table 2 use 160, 192, 224and 256-bit ECC and, in
addition, method 1 also uses 128bit AES as the minimum key size specified [22] which is
equivalent to 256 bit ECC. So, in the case of 256-bit ECC, there is no difference in term of
security level of using this symmetric algorithm. In general, it is shown that table 2 has less
time to encrypt the same data size than the one in table 1. By using 256-bit ECC to encrypt 60
byte message, method 1 needs about 15 seconds, while method 2 is about 3 seconds which is
about 1/5 of method 1. The other ECCs’ key size are for data comparison, thought they
provide different security levels from AES-128 bit.
ADVANTAGES:
CHAPTER 3
DESIGN AND DRAWING
3.1 INTRODUCTION
The chapter shall discuss the design aspects of the project. It includes the criteria on
which the required algorithms were selected, the process algorithm, flowchart and its
description.
3.2 OBJECTIVE
To design and build a modified EVM which would provide both means of voting i.e.
Booth Voting using modified EVM (Electronic Voting Machine) and e-Voting using mobile
phones (Mobile Voting System) by developing android application for smartphone.
Smart-
Phone LCD
Buzzer
Common PIC
Server Micrco-
PC ntroller
LEDs
GSM RS232
Module Serial
Serial Bus
4x4
Bus
Keyboard
3.4.1 Smartphone:
• An android application will be developed for encryption of user’s vote and voter ID
using Elliptic Curve Cryptography algorithm.
• Voter will send this cipher text to the number provided by Election Commission.
• GSM module will be connected to the common server using RS232 serial bus.
• It will receive the cipher text sent from smartphone by the user.
3.4.3 Administrator:
• Administrator is nothing but a PC acting as a common server. It stores all the database
of voters.
• The voter authentication will be done by administrator.
3.5 ALGORITHM:
3.6 FLOWCHART:
The properties and functions of elliptic curves have been studied in mathematics for
150 years. Their use within cryptography was first proposed in 1985, (separately) by Neal
Koblitz from the University of Washington, and Victor Miller at IBM. An elliptic curve is not
anellipse (oval shape), but is represented as a looping line intersecting two axes (lines on a
graph used to indicate the position of a point). ECC is based on properties of a particular type
of equation created from the mathematical group (a set of values for which operations can be
performed on any two members of the group to produce a third member) derived from points
where the line intersects the axes. Multiplying a point on the curve by a number will produce
another point on the curve, but it is very difficult to find what number was used, even if you
know the original point and the result. Equations based on elliptic curves have a characteristic
that is very valuable for cryptography purposes: they are relatively easy to perform, and
extremely difficult to reverse.
The industry still has some reservations about the use of elliptic curves. Nigel Smart,
a Hewlett Packard researcher, discovered a flaw in which certain curves are extremely
vulnerable. However, Philip Deck of Certicom says that, while there are curves that are
vulnerable, those implementing ECC would have to know which curves could not be used.
He believes that ECC offers a unique potential as a technology that could be implemented
worldwide and across all devices. According to Deck (quoted in Wired), "the only way you
can achieve that is with elliptic curve."
It's a computer programming system developed and owned by Microsoft. Visual Basic
was originally created to make it easier to write programs for the Windows computer
operating system. The basis of Visual Basic is an earlier programming language called
BASIC that was invented by Dartmouth College professors John Kemeny and Thomas Kurtz.
Visual Basic is often referred to using just the initials, VB. Visual Basic is easily the most
widely used computer programming system in the history of software.
3.5.3 MS ACCESS:
Microsoft Access stores data in its own format based on the Access Jet Database
Engine. It can also import or link directly to data stored in other applications and databases.
CHAPTER 4
CONCLUSION AND FUTURE SCOPE
4.1 CONCLUSION:
For developing secure voting system, previous voting systems were compared and
analyzed the requirements for the security norms. The system with Modified EVM for Secure
Mobile Voting using ECC is designed. It is found that this system has improvements in terms
of security, speed, accuracy, feasibility.
REFERENCES: