Paper Status Tracking
Contact us
[email protected]
Click here to send a message to me 3275638434
Paper Publishing WeChat

Article
Affiliation(s)

1. Department of Computer Science, Kampala International University, Kasanga, Kampala, Uganda 2. Faculty of Mathematics, Physical Sciences and Life Sciences, Sheridan College, Perth, Australia 3. Department of Computer Science and Information Systems, Mount Royal University, Calgary, Canada 4. Department of Computer Science, Alhikmah University, Ilorin, Kwara State, Nigeria

ABSTRACT

E-voting (electronic voting) is a significant part of an E-election (electronic election), which refers to the use of computers or computerized voting equipment to cast ballots in an election. Due to the rapid growth of computer technologies and advances in cryptographic techniques, E-voting is now an applicable alternative for many non-governmental elections. However, security demands are paramount to electoral process in political arena. It was revealed that researchers show little interest in robustness of E-voting system compared to other E-voting requirements [1]. This paper shows that RSA (Ron Rivest, Adi Shamir and Leonard Adleman) cryptography algorithm can be incorporated into E-voting process as a whole. The RSA cryptography algorithm ensures that votes casted are secured, thus maintaining the privacy of votes. The performance of the cryptography algorithm is tested on a university E-voting system over a public network. The E-voting process is initiated by a server system that other computer nodes are connected to. The system is such that when the votes are cast on the nodes, the RSA technique encrypts the vote that is sent to the server system using both node and vote identity number. The system performs consistently and reliably which in return gives good level of confidence of votes count.

KEYWORDS

Cryptography, RSA algorithm, E-voting, paper ballot

Cite this paper

References
[1] Cooke, R., and Anane, R. 2012. “A Service-Oriented Architecture for Robust E-Voting.” Service Oriented Computing and Applications 3 (3): 249-66. Springer. 
[2] Gritzalis, P. 2002. “Secure Electronic Voting.” 7th Computer Security Incidents Response Teams Workshop, 1-21. Syros, Greece: Kluwer Academic Publishers.
[3] Karatsiolis, V., Langer, L., Schmidt, A., Tews, E., and Wiesmaier, A. 2010. Cryptographic Application Scenarios. Darmstadt, Germany.
[4] Cetinkaya, O., and Cetinkaya, D. 2007. “Verification and Validation Issues in Electronic Voting.” The Electronic Journal of E-Government, 117-26.
[5] Bellare, M., and Rogaway, P. 2005. “Introduction.” In P. R. Mihir Bellare, Introduction to Modern Cryptography, 10.
[6] Buchsbaum, T. 2004. “E-Voting: International Developments and Lessons Learnt.” Electronic Voting in Europe—Technology, Law, Politics and Society, 31-42. Lake of Constance: GI, the Gesellschaft für Informatik.
[7] Lonergan, A. 2007. Dependability of Electronic Voting Machines. Galway, Ireland.
[8] Rivest, R. 2001. Electronic Voting. Cambridge, Massachusetts, United States of America.
[9] Remmert, M. 2004. “Towards European Standards on Electronic Voting.” Electronic Voting in Europe—Technology, Law, Politics and Society,     13-6. Lake of Constance: GI, the Gesellschaft für Informatik.
[10] Ofori-Dwumfuo, G., and Paatey, E. 2011. “The Design of an Electronic Voting System.” Research Journal of Information Technology, 91-8.
[11] Diffie, W. 1988. “The First Ten Years of Public-Key Cryptography.” In Proceedings of the IEEE, 76 (5): 560.
[12] Kessler, G. 2013. An Overview of Cryptography. Retrieved March 20, 2013, from Gary Kessler: http://www.garykessler.net/library/crypto.html.
[13] Cormen, T., Leierson, C., and Rivest, R. 1998. Introduction to Algorithms. Cambridge: The MIT Press.
[14] Pfleeger, C., and Pfleeger, S. 2007. Security in Computing, 4th ed. Upper Saddle River, NJ: Prentice Hall.
[15] Eli, B., and Adi, S. 1990. “Differential Cryptanalysis of DES-Like Cryptosystems.” Journal of Cryptology 4: 372.
[16] Diffie, W., and Hellman, E. 1976. “New Directions in Cryptography.” IEEE Transactions on Information Theory IT-22 (6): 644-54.
[17] Ibrahim, S., Kamat, M., Salleh, M., and Abdul Aziz, S. 2003. Secure E-Voting with Blind Signature. Johor Bharu, Johor, Malaysia.
[18] Infoplease. 2012. Election Ballots: Types and History. Retrieved May 9, 2013, from Infoplease Website: http://www.infoplease.com/spot/campaign2000ballot.html.
[19] Kohno, T., Stubblefield, A., Rubin, A., and Wallach, D. 2004. “Analysis of an Electronic Voting System.” IEEE Symposium on Security and Privacy, 1-23. IEEE Computer Society Press.
[20] Rubin, A. 2001. Security Considerations for Remote Electronic Voting over the Internet. Florham Park, New Jersey, United States of America.
[21] Rubin, D. 2001. The Security of Remote Online Voting. University of Virginia, United States of America.
[22] Forouzan, B. 2008. Cryptography and Network Securit. McGraw-Hill International Edition.
[23] Anderson, R. 2001. Security Engineering, 1st ed. John Wiley & Sons, Inc.
[24] Fashoto, S. G., Owolabi, O., Adelakun, J., Elujide, I. and Dehinbo, J. 2013. “Integration of RSA Algorithm into E-voting System of a University.” In the Proceedings of the 2nd Annual International Conference on E-leadership of IEEE in University of Pretoria, South Africa.

About | Terms & Conditions | Issue | Privacy | Contact us
Copyright © 2001 - David Publishing Company All rights reserved, www.davidpublisher.com
3 Germay Dr., Unit 4 #4651, Wilmington DE 19804; Tel: 001-302-3943358 Email: [email protected]