0% found this document useful (0 votes)
12 views5 pages

Ictbs 211

Uploaded by

Krik Sha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
12 views5 pages

Ictbs 211

Uploaded by

Krik Sha
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 5

Blockchain Technology in Secure Voting Systems:

Enhancing Transparency and Trust


Kavinkumar R Sowndariya K Sanju P
Department of Information Technology Department of Information Technology Department of Information Technology
Knowledge Institute of technology Knowledge Institute of technology Knowledge Institute of technology
Salem, India Salem, India Salem, India
[email protected] [email protected] [email protected]

Ram kumar R Dr. A. Gomathi


Department of Information Technology Department of Information Technology
Knowledge Institute of technology Knowledge Institute of technology
Salem, India Salem, India
[email protected] [email protected]

Abstract—Secure voting systems face numerous crucial security features that can be bolstered through the
challenges, including concerns related to transparency, implementation of blockchain technology. While integrating
tampering, and trust. While traditional methods have a new technology into an existing system can be a significant
struggled to address these issues effectively, blockchain challenge, adapting to new technologies and methods is
technology offers a promising solution. This paper conducts essential for enhancing security features and addressing
a comparative analysis of existing solutions and proposed vulnerabilities within the system.
innovations in secure voting systems, with a focus on
leveraging blockchain technology. We first review current
approaches to secure voting systems, including II. OVERVIEW OF EXISTING VOTING SYSTEM
cryptographic protocols, paper trails, and electronic voting Electronic Voting Machines (EVMs) are the standard
machines, highlighting their strengths and limitations. means of conducting elections in India. The EVM system
Subsequently, we explore the potential of blockchain was developed by the Election Commission of India (ECI) in
technology to revolutionize voting systems by providing
collaboration with state-owned electronics companies Bharat
transparency, immutability, and decentralization. Through
Electronics Limited (BEL) and Electronics Corporation of
case studies and empirical evidence, we evaluate the
effectiveness of blockchain-based solutions in addressing India Limited (ECIL). [2]
key challenges such as voter fraud and lack of verifiability. The EVM consists of two main units - a Balloting Unit
(BU) and a Control Unit (CU). The BU is placed inside the
Keywords—Blockchain Technology,Secure Voting voting compartment where the voter casts their vote, while
Systems, Zero-Knowledge Proofs, Decentralized Identity the CU is with the polling officer. The two units are
Management, Secure Multiparty Computation
connected by a 5-meter cable.

I. INTRODUCTION
Traditional Electronic Voting Machines (EVMs) have
several vulnerabilities and lack transparency. The new
generation of EVMs typically uses EEPROM (Electrically
Erasable Programmable Read-Only Memory) and
microcontrollers to store vote count. This architecture can be
easily manipulated, making any tampering of the EVM
difficult to identify. The underlying mechanism of EVMs is
not transparent, which undermines public trust in the voting
process. Traditional EVMs lack the transparency, security,
and integration of new technologies that are necessary for a
robust and trustworthy voting system. [1]
While the introduction of Voter Verifiable Paper Audit
Trail (VVPAT) systems aims to enhance security, experts Figure 1. Existing Electronic Voting Machine
argue that VVPAT alone does not address underlying issues, The BU has buttons for each candidate, with their name
especially the lack of simultaneous parallel counting of votes and party symbol displayed. When a voter presses the button
in EVMs and VVPAT slips at all polling booths, for their chosen candidate, the vote is registered in the CU.
compromising the voter's ability to ensure the safety of their The CU keeps a running tally of all votes cast.
cast vote until the end of the election process.
The EVM runs on a 6-volt single alkaline battery fixed in
Using blockchain technology in the traditional voting the CU, allowing it to function even in areas without
system may present challenges, but the integration of these electricity. The machines are self-contained, with no wireless
two can offer enhanced security and transparency in the or internet connectivity. [3]
voting process. Traditional voting machines often lack
Prior to election day, a mock poll is conducted where a transparency and independent auditing would be crucial to
predetermined number of test votes are cast on each EVM in ensuring the public's trust in the electoral system.
the presence of political party representatives. The results of
this mock poll are then matched with the expected results to III. INTEGRATION OF BLOCK CHAIN IN VOTING SYSTEM
ensure the EVM is functioning properly.
Unlike traditional data structures, blockchain technology
On election day, the polling officer activates the EVM by offers a unique advantage in the context of voting systems.
pressing the 'Ballot' button on the CU, which enables the Unlike other systems where an administrator can freely add,
voter to cast their vote on the BU. After the voter presses the delete, or update data, blockchain's immutable nature
button for their chosen candidate, a paper slip is printed by prevents such tampering. Once a block is added to the
the Voter Verifiable Paper Audit Trail (VVPAT) machine blockchain, it cannot be deleted or modified under any
attached to the EVM. This slip is visible to the voter for 7 circumstances. Even if an intruder attempts to attack a node,
seconds before being cut and dropped into a sealed box in the surrounding nodes will detect the discrepancy and
the VVPAT. automatically rebuild the damaged node, preserving the
The VVPAT provides a physical record of the voter's chain's integrity. [7] The decentralized nature of blockchain
choice, allowing them to verify that their vote was registered networks means the voting system is not dependent on any
correctly. It also enables a physical audit of the electronic single computing node. Even if one or more nodes become
votes in case of any discrepancies. [4] [3] unavailable or are attacked, the overall voting process can
continue uninterrupted, ensuring reliability and resilience. [8]
After voting concludes, the CU is sealed and stored
securely. On counting day, the CU is unsealed and the final A. Decentralized Block chain network
vote tally is displayed. The VVPAT slips are also counted in
Modify the existing EVMs to communicate with a
a random sample of polling stations to verify the EVM
decentralized blockchain network for secure storage and
results.
verification of voting data. Implement cryptographic hashing
to ensure the integrity and immutability of votes recorded on
II. ISSUES AND VULNERABILITIES OF EXISITING SYSTEM the blockchain.[9] A decentralized blockchain operates
The M3 Electronic Voting Machines (EVMs) used in without a central authority, distributing control among its
India have several security features, but there are also participants in a peer-to-peer fashion. Utilizing a sequential
potential vulnerabilities that raise concerns about chain of blocks linked by cryptographic hashes, it maintains
transparency and verifiability. [5] an immutable ledger of transactions accessible to all network
nodes. Consensus mechanisms, such as Proof of Work or
 One key issue is the software used in the ballot unit Proof of Stake, ensure transaction validation and ledger
of the EVM. The software is programmed directly agreement. Smart contracts, self-executing agreements coded
into the microcontrollers, which are one-time into the blockchain, automate processes without
programmable (OTP). This means the software intermediaries.[8] Cryptocurrencies native to these networks
cannot be altered or verified after manufacturing, as it facilitate transactions and incentivize participants. Overall,
is essentially "burned" into the hardware. This lack of decentralized blockchains offer transparency, security, and
visibility into the software raises questions about censorship resistance, enabling trustless transactions and
whether the same software is consistently contract execution.
implemented across all EVMs.
 However, there is no way for independent parties to
verify that the correct software has been fabricated
into these microcontrollers. This lack of transparency
is a significant concern, as it makes it difficult to
ensure the integrity of the voting process.
 Another potential vulnerability is the handshake
process between the various components of the EVM.
While the EVM has tamper-proof and unauthorized
detection modules, the details of how these features
work are not fully disclosed. This lack of
transparency makes it challenging for the public to
have confidence in the security measures
implemented. [6]
 Despite the ECI's claims of advanced security
features in the M3 EVMs, such as tamper detection
and self-diagnostics, the underlying technical details
and the extent of their effectiveness are not publicly
available. This lack of transparency is a significant Figure 2. Voting System Architecture
concern, as it prevents independent verification and
auditing of the EVM system. B. How vote is added to decentralized block chain
In conclusion, while the M3 EVMs incorporate various The voting process begins with the voter casting their
security features, the lack of transparency around the vote through a Ballot unit. This vote is then converted into a
software, hardware, and security mechanisms raises valid digital format, which is typically represented as a unique
concerns about the overall integrity and verifiability of the identifier or a hash value. [10]
voting process. Addressing these issues through increased
 The digital vote is then hashed using a  The control unit in the proposed voting system
cryptographic hash function, such as SHA-256, to generates a checksum for the vote data. This
create a unique digital fingerprint. This hash is used checksum is a digital fingerprint that ensures the
to ensure the integrity and authenticity of the vote. integrity of the vote by detecting any changes or
Additionally, the vote is encrypted using a public errors in the data. The checksum is typically
key encryption algorithm, such as RSA, to protect generated using a cryptographic hash function, such
the vote from unauthorized access. [11] as SHA-256, which is a strong one-way function
that generates a unique hash value for the input
 The hashed and encrypted vote is then packaged
data. This hash value is then used to verify the
into a transaction, which is a fundamental unit of
integrity of the vote data. [14]
data in a blockchain. The transaction includes the
vote itself. This transaction is then broadcast to the  The blockchain unit in the system also generates a
network of nodes participating in the blockchain. checksum for the vote data. This checksum is used
to ensure that the vote data is correctly recorded and
stored on the blockchain. The blockchain unit uses a
similar hash function to generate the checksum,
ensuring that the integrity of the vote data is
maintained throughout the process.
The verification of checksums in the voting system
involves comparing the checksum generated by the control
unit with the checksum generated by the blockchain unit. If
the checksums match, it indicates that the vote data has been
correctly recorded and stored on the blockchain.

IV. CRYPTOGRAPHIC HASHING AND ENCRYPTION


Cryptographic hashing is a fundamental concept in
Figure 3. Addition of each vote to the adding a vote to the block chain network, used to ensure the
blockchain integrity of the voting process. Cryptographic hashing is used
 The verified transactions are then aggregated into a to create a unique digital fingerprint for each vote. This
block, which is a collection of transactions that are fingerprint, also known as a hash value, is generated using a
linked together through a unique identifier called a cryptographic hash function such as SHA-256. The hash
block hash. The block is then broadcast to the value is used to verify the integrity of the vote by ensuring
network, where it is verified by each node. The that any changes to the vote data would result in a different
nodes use a consensus mechanism, such as Proof of hash value. [15]
Work (PoW) or Proof of Stake (PoS), to agree on
the validity of the block and ensure that it is added
to the blockchain. [12]
The process of adding a vote to a decentralized
blockchain involves several technical steps, including vote
generation, hashing and encryption, transaction creation,
verification and validation, consensus mechanism, block
addition. These steps ensure the integrity, security, and Figure 5. Outline of cryptographic hashing
transparency of the voting process, making it a reliable and
trustworthy method for recording votes. Encryption is used to protect the vote data from unauthorized
access. The vote data is encrypted using public-key
C. Check sum verification cryptography, ensuring that only the authorized owner of the
vote can decrypt and view the content. The encryption
The generation of checksums in both the control unit and process involves the use of a public key and a private key.
the blockchain unit is crucial for maintaining the integrity The public key is used to encrypt the vote data, while the
and accuracy of the voting process. The checksums provide a private key is used to decrypt it.
digital fingerprint of the vote data, allowing for quick
verification of the data's integrity. This ensures that any Working of cryptographic hashing
changes or errors in the data can be detected, preventing
fraudulent votes from being recorded or altered. [13] 1) Data Padding:
The first step involves adjusting the data length to be a
multiple of 512 bits by adding extra bits to the original
message. This ensures that the total length is precisely 64 bits
less than a multiple of 512 bits.
For example, if the message length is denoted as L, the
total length after padding should be L+P+64 = n*512, where
L is the original message length, P represents the padded
bits.
2) Adding Length Bits:
Figure 4. Checksum verification process
After padding the message in the previous step, the next  Encrypt the hashed vote data: $$ c = m^e \mod n =
action is to append the length bits (64 bits) to make the total 10^5 \mod 221 = 82 $$.
length a multiple of 512 bits.
The calculation for the 64 bits involves taking the
3. Decryption:
original message length (L) modulo 2^32 to ensure the
message block is complete: L+P+[L mod 2^32] = n*512.  To transmit the encrypted hashed vote data to a
node securely.
3) Initialization of Chaining Variable:
The entire data is segmented into n blocks of 512 bits  The node possessing the private key can decrypt the
each, denoted as M1, M2, M3, ..., Mn. data: $$ m = c^d \mod n = 82^{29} \mod 221 = 10
$$.
To proceed with the hashing process, specific buffer
values known as Keys (represented as 'k') are initialized for This process ensures that the hashed vote data is securely
further operations. encrypted using RSA before being transmitted to a node in
the blockchain network. By following these steps, the
4) Processing Each Block: integrity and confidentiality of the vote data are maintained
Each 512-bit block is further divided into 16 sub-blocks throughout the voting process, enhancing the security and
of 32 bits each, totaling 64 rounds of operations. trustworthiness of the system.
The output from each round serves as the input for the The use of cryptographic hashing and encryption ensures that
subsequent round. The Keys (K[i]) are pre-set for all rounds, the vote data is protected from unauthorized access and
while W[i] is calculated uniquely for each block based on the tampering, while the blockchain technology provides a
iterations completed. decentralized and transparent platform for recording and
This process continues iteratively until all n blocks are verifying votes. [15]
processed, with the final result representing the SHA-256
digest of the entire message. V. IS HACKING POSSIBLE IN THIS SYTEM?
Table I. Working of cryptographic hashing
INTRUSION AND MANIPULATION BY AN INTRUDER
Vote data Hashing function Hashed value If an intruder attempts to manipulate a node in the
Voter1→Candidat SHA-256(M) 185F8DB32271F blockchain-based voting system, the system's design and
e5 E25F561A6FC93 security measures prevent unauthorized changes and
maintain the integrity of the voting process. Here's how the
8B2E2643……..
system addresses this scenario:
Voter1→Candidat SHA-256(M) 4FF7975B53DB6
 Immutable Blockchain: In the blockchain system,
e1 C029D88F6AC67 once a node is added to the chain, it becomes
BD78D1………. immutable and cannot be altered or deleted under
any circumstances. This means that even if an
Working of RSA Encryption intruder manages to access a node, they cannot
modify the data stored within it.
RSA encryption plays a crucial role in securely transmitting
hashed vote data to a node. This process ensures the  Decentralized and Resilient: The blockchain's
confidentiality and integrity of the vote data during decentralized nature ensures that the voting system
transmission. Let's adapt the RSA encryption example to fit remains operational even if one or more nodes are
this scenario: attacked or become unavailable. The system is
designed to detect any discrepancies in the chain
Example: RSA Encryption for Secure Transmission
and automatically rebuild any damaged nodes,
in a Voting System
maintaining the integrity of the chain. [7]
1) Key Generation:  Consensus Mechanism: The system relies on a
 Choose two large prime numbers, $$ p = 17 $$ and consensus mechanism, such as Proof of Work or
$$ q = 13 $$. Proof of Stake, to validate and agree on the
 Calculate $$ n = p \times q = 221 $$ and $$ z = (p- transactions added to the blockchain. This ensures
1) \times (q-1) = 192 $$. that any unauthorized changes made by an intruder
are rejected by the network through the consensus
 Select a number $$ e = 5 $$ (ensuring $$ 1 < e < z process. [17]
$$).
 Compute $$ d = 29 $$. USE OF CHECKSUM TO VERIFY CHANGES IN VOTE COUNT
 Public key pair: $$(221, 5)$$, Private key pair: $ PROCESS
$(221, 29)$$. The checksum plays a crucial role in verifying the
integrity of the voting data and detecting any changes made
during the vote count process. Here's how the checksum is
2) Encryption: used in the system: [16]
 Hash the vote data to create a unique fingerprint.  Checksum Comparison: The system uses
 Suppose the hashed vote data is represented as $$ m checksums to compare the original data with the
= 10 $$. modified data. If any changes are made to the
vote data, the checksum values will differ, VII. REFERENCES
indicating that the data has been tampered with. [1] “https://www.techtarget.com/whatis/definition/EEPROM-electrically-
erasable-programmable-read-only-memory,” TechTarget, 2023.
 Verification Process: By comparing the
[2] “ https://www.eci.gov.in/evm-faq,” Election Commission of India,
checksum values before and after the vote count 15th April 2024.
process, the system can quickly detect any
[3] “https://en.wikipedia.org/wiki/Electronic_voting,” WIKIPEDIA,
discrepancies or unauthorized changes. If the 2021.
checksum values do not match, it signals that [4] “https://en.wikipedia.org/wiki/Voter-verified_paper_audit_trail,”
the data has been altered, prompting further WIKIPEDIA, 2021.
investigation. [5] Debashish Das, Ong Kang Yi, “Block Chain Technology for
Electronic Voting,” ResearchGate, 2020.
 Ensuring Data Integrity: The use of checksums
[6] S. Aruna, M. Maheswari and A. Saranya, “Highly Secured
provides a reliable method to ensure the Blockchain Based Electronic Voting System Using SHA3 and Merkle
integrity of the voting data. By verifying the Root,” IOP Conference Series, 2020.
checksum values, the system can confirm that [7] Mohammad Hajian Berenjestanaki , Hamid R. Barzegar, Nabil El
the vote count process has been conducted Ioini and Claus Pahl, “Blockchain-Based E-Voting Systems: A Technology
accurately and that the data has not been Review,” electronics, 2024.
tampered with. [8] Prof. Santosh Kumar Biradar, Diksha Mohod, Sampada Joshi, Rohini
Role, Prasen Waikar, “Secure Digital Voting System on Blockchain,”
In summary, the system's use of checksums helps to International Journal of Advanced Research in Science, Communication
verify the integrity of the voting data and detect any and Technology (IJARSCT), 2, November 2023.
unauthorized changes during the vote count process, [9] Hee-Dong Park, “A Decentralized E-Voting System Based on
ensuring the reliability and security of the voting system. Blockchain Network,” International Journal of Innovative Technology and
Exploring Engineering (IJITEE), pp. 3650-3652, 2019.
[10] Syada Tasmia Alvi,Mohammed Nasir Uddin, Linta
VI. CONCLUSION Islam,"DVTChain: A blockchain-based decentralized mechanism to ensure
the,” Journal of King Saud University - Computer and Information
The integration of blockchain technology into the Sciences, Vols. ,, 2022.
traditional voting system presents a promising solution to [11] Polepaka Sanjeeva,M. Sai Sathwik, G. Sai Prasad, G. Praneeth Reddy
address the vulnerabilities and lack of transparency inherent “Decentralized and Automated Online Voting System using Blockchain
in the current Electronic Voting Machine (EVM) Technology,” ResearchGate, 2023.
architecture. The decentralized and immutable nature of [12] Uzma Jafar, Mohd Juzaiddin Ab Azi, Zarina Shukur “Blockchain
blockchain offers enhanced security, transparency, and for Electronic Voting,” MDPI, 2021.
verifiability that can significantly improve the integrity of the [13] Ammar Riadh Kairaldeen,Nor Fadzilah Abdullah,Asma Abu-
voting process. Samah,and Rosdiadee Nordin, “Data Integrity Time Optimization of a
Blockchain IoT Smart,” Hindawi, 2021.
By modifying the existing EVMs to communicate with a [14] “https://www.shiksha.com/online-courses/articles/cryptographic-
decentralized blockchain network, the voting data can be hash-functions-in-blockchain/#:~:text=There%20are%20a%20bunch
securely stored and verified. The use of cryptographic %20of,%2D256%2C%20Whirlpool%2C%20etc,” shiksha, 2023.
hashing and encryption ensures the integrity and [15] Abhishek Subhash Yadav,“E-Voting using Blockchain Technology,”
ResearchGate, 2020.
confidentiality of the vote data, while the consensus
[16] “checksum,” https://www.polyas.com/election-glossary#A, 2023.
mechanisms of the blockchain prevent unauthorized
[17] Rihab H. Sahib, Eman Salih Al-Shamery, “A Review on Distributed
tampering or manipulation. Blockchain Technology for E-voting,” A Review on Distributed
The implementation of checksum verification further Blockchain Technology for E-voting, 2021.
strengthens the system by providing a reliable method to [18] Rishi Kumar Sharma, Vishal Vig, “A STUDY ON SECURITY
ISSUES, VULNERABILITY AND THREATS CHALLENGES,”
detect any discrepancies or changes in the vote data. This ResearchGate, 2017.
multi-layered approach to security and transparency
addresses the key concerns raised about the current EVM
system, thereby bolstering public trust in the electoral
process.
While the integration of blockchain technology into the
voting system may present technical and logistical
challenges, the potential benefits in terms of enhanced
security, transparency, and verifiability make it a worthwhile
endeavor. As technology continues to evolve, adapting the
voting system to incorporate these advancements is crucial
for maintaining the integrity and credibility of democratic
elections.
Overall, the integration of blockchain technology in the
traditional voting system holds the promise of a more secure,
transparent, and trustworthy electoral process, which is
essential for the healthy functioning of a democratic society.

You might also like