A Real Time E-Voting System: An Initiative towards Digital India NitanKohli

advertisement
International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 3- May 2016
A Real Time E-Voting System: An Initiative
towards Digital India
NitanKohli1, Himanshu Saurav2, Devesh Samrat3, Pratyush4
8thSemester, Dept of ISE, SJBIT, Bangalore
1. Accuracy
Abstract
2. Simplicity
Nowadays everything is becoming online, so
human tendency has changed they try to do
everything from home using Internet.Election is
also becoming online. But if the voting system is
3. Democracy
4. Verifiability
5. Privacy
6. Security.
made online the security is major concern. The web
based Internet voting system provides security to
For such an internet voting system,
vote when it is transmitting from voting client to
security and privacy are main concerns. From that
voting server. The main tool is the concept of
point of view, an implementation of secure Internet
multiple encryption and decryption. Internet voting
voting system appears to be another application of
with the widespread use of Internet is becoming
cryptography and network security. Electronic
appealing to groups in place of paper based
voting has been intensively studied for over the last
elections or vote by mail election to geographically
twenty years. Many e-voting system, therefore,
distributed voters, as more people are gaining
have been proposed in the last several decades and
access to the Internet.
both the security as well as the effectiveness has
been improved. Nevertheless, to the best of our
Key terms: Multiple encryptions, Independent Key,
Digital Signature, OTP
knowledge, no practical and complete solution has
been found for large scale elections over a network,
say Internet. Our approach suggests a practical
INTRODUCTION
application of the existing cryptographic schemes
Election and voting are well known things in
and digital signature that ensures integrity of the
modern days of Democracy. Electronic online
vote cast by voter and authentication of voter at the
voting over the Internet would be much more
two levels. Design of secure e-voting system over
profitable. Many voters would appreciate the
network is indeed a very difficult task as all the
possibility of voting from anywhere. A company
requirements of the voting system have to be met.
having their offices in different locations, can use
Failure tonsure even one of the specifications can
internet voting for their election, in their employees
lead to chinks and glitches that can be exploited by
from all offices will take part in election from their
a middleman to forge or manipulate the intricate
own offices. Electronic voting, as the name implies,
details. Subsequently, the result of the election is
is the voting process held over electronic media,
computed from the sum of the votes which is
i.e. computers. In general, such internet voting
jointly decrypted by the authorities. A voting
system should satisfy such requirements as follows:
ISSN: 2231-5381
http://www.ijettjournal.org
Page 101
International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 3- May 2016
scheme must ensure that the voter can keep his vote
Multiple encryption
private.
Multiple encryptions are the process of encrypting
an already encrypted message one or more times,
In traditional elections, a voter usually
goes to the voting stations. After direct person
verification with some IDs, the voter is allowed to
vote. The voter is then given a ballot which allows
a single vote. Once the ballot is used, it cannot be
either using the same or a different algorithm. It is
also known as cascade encryption, cascade
ciphering,
multiple
encryption,
and
super
encipherment. Super encryption refers to the outerlevel encryption of a multiple encryption.
used again. However, this ballot must also be
anonymous. The ballot must identify the voter as
Independent keys
being permitted to vote, but not reveal their actual
Picking any two ciphers, if the key used is the same
identity, and the voter must also be given
for both, the second cipher could possibly undo the
assurances of this. Traditional polling methods trust
first cipher, partly or entirely. This is true of
a lot of parties during the election. The current
ciphers where the decryption process is exactly the
methods require an attacker interact directly with
same as the encryption process—the second cipher
the voting process to disrupt it. There is a greater
would completely undo the first. If an attacker were
chance of getting caught as there will be physical
to recover the key through cryptanalysis of the first
evidence in the traditional polling.
encryption layer, the attacker could possibly
decrypt all the remaining layers, assuming the same
On the other end, internet is harder to
key is used for all layers.
control and manage the security as Network and
internet related attacks are more difficult to trace.
To prevent that risk, one can use keys that
In the traditional polling, you know who is in the
are statistically independent for each layer (e.g.
election room. Also with the internet or network
independent RNGs).
related voting, from all around the world you will
have attackers, not only by the few people in the
The importance of the first layer
With the exception of the one-time pad, no cipher
room.
has been theoretically proven to be unbreakable.
Online voting (e-voting) would be more
Furthermore, some recurring properties may be
convenient, relatively secure and utilize fewer
found in the cipher texts generated by the first
resources. To be able to access e-voting system
cipher. Since those cipher texts are the plaintexts
from a personal, business or even a public library
used by the second cipher, the second cipher may
computer may be more convenient for many people
be rendered vulnerable to attacks based on known
needing to vote. This could potentially be a solution
plaintext properties. This is the case when the first
for the low voter turnout at the polls. However, it is
layer is a program P that always adds the same
still
be
string S of characters at the beginning (or end) of
conducted online or over the internet due to the
all cipher texts (commonly known as a magic
high level of concern over security. The main
number).
questionable
whether
elections
can
objective of the proposed system is to increase the
voting percentage and even to improve the security
of voting system with valid votes.
When found in a file, the string S allows
an operating system to know that the program P has
to be launched in order to decrypt the file. This
ISSN: 2231-5381
http://www.ijettjournal.org
Page 102
International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 3- May 2016
string should be removed before adding a second
Notions of security
layer. To prevent this kind of attack, one can use
the method provided by Bruce Schneider in the
references below: generate a random pad of the
same size of the plaintext, then XOR the plaintext
with the pad, resulting in a first cipher text. Encrypt
In the foundational paper, Goldwasser, Micali, and
Rivest lay out a hierarchy of attack models against
digital signatures:
1.
the pad and the first cipher text with a different
cipher and a different key, resulting in 2 more
In a key-only attack, the attacker is only
given the public verification key.
2.
In a known message attack, the attacker is
cipher texts. Concatenate the last 2 cipher texts in
given valid signatures for a variety of
order to build the final cipher text. A cryptanalyst
messages known by the attacker but not
must break both ciphers to get any information.
chosen by the attacker.
This will, however, have the drawback of making
3.
In an adaptive chosen message attack, the
the cipher text twice as long as the original
attacker first learns signatures on arbitrary
plaintext. Note, however, that a weak first cipher
messages of the attacker's choice.
may merely make a second cipher that is vulnerable
to a chosen plaintext attack also vulnerable to a
4.
They also describe a hierarchy of attack
results:
known plaintext attack. However, a block cipher
A total break results in the recovery
must not be vulnerable to a chosen plaintext attack
of the signing key.
to be considered secure. Therefore, the second
A universal forgery attack results in
cipher described above is not secure under that
the ability to forge signatures for any
definition, either. Consequently, both ciphers still
message.
need to be broken. The attack illustrates why strong
A selective forgery attack results in a
assumptions are made about secure block ciphers
signature on a message of the
and ciphers that are even partially broken should
adversary's choice.
never be used.
An existential forgery merely results
Digital Signature
in some valid message/signature pair
A digital signature is a mathematical scheme for
not already known to the adversary.
demonstrating the authenticity of a digital message
or document. A valid digital signature gives a
recipient reason to believe that the message was
The strongest notion of security, therefore, is
security against existential forgery under an
adaptive chosen message attack.
created by a known sender, such that the sender
cannot
deny
having
sent
the
message
II.RELATED WORK
(authentication and non-repudiation) and that the
Computer scientists who have done work in, or are
message was not altered in transit (integrity).
interested in, electronic voting all seem to agree on
Digital signatures are commonly used for software
two things: Internet voting does not meet the
distribution, financial transactions, and in other
requirements for public elections Currently widely-
cases where it is important to detect forgery or
deployed voting systems need improvement Voting
tampering.
on the Internet using every day PC's offers only
weak security, but its main disadvantages are in the
ISSN: 2231-5381
http://www.ijettjournal.org
Page 103
International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 3- May 2016
areas of anonymity and protection against coercion
not to use this system. Author can see that his
and/or vote selling. It's such a truly bad idea that
architecture increased dependability very much.
there seems to be no credible academic effort to
Also the author considered main requirements of
deploy it at all. The Presidential elections of 2000
voting like secrecy, mobility, accuracy, uniqueness
brought national attention to problems with current
and etc. Paying attention to security needs of
American methods of casting and counting votes in
voting, the author used some approaches to create a
public elections. Most people believe that the
secure System. Author showed that this system will
current system should be changed; there is much
not fail even if some components fail and both
disagreement on how such changes should be
availability and security as the most important
made.
specification of voting systems will be addressed.
As voting via internet is very easy and has no time
This paper [1], review that currently deployed vote
verification methods. By discuss their weaknesses
and money costs for voters. So, system can
anchorage people to take part in the election.
with the aim of proposing a more reliable and
robust vote verification method. Authors in this
Author
[4]
proposed
an
E-voting
paper, sought to propose a vote verification
procedure which ensures voters and candidate’s
technique which would able to verify vote against
confidentiality and accuracy. Many issues still
major possible threats and enables all election
exist, for example, when large number of voters
participants to verify votes.
cast their ballots at the same time, will it cause
denial of service (DOS) in the Internet? How to
For this purpose, they need to investigate a
combination of both technological Authors [2],
proposed design for e voting systems based on
dependable web services. The results got from the
analysis of the evaluation of the proposed design,
design an efficient and secure online voting
system? Nevertheless, at least for the counting
procedure,
different
levels
of
measurements
introduced in our proposal have decreased the risk
for unfairness in actual elections.
presented that solution, increase the dependability
to a great extent. The author also explained that this
The proposed deign in paper [5] contains that the
design can respond to main requirement of e-
voting can be done only at the places where the
voting. The availability is one of key attributes and
voting places are installed. Though voting can be
the most important requirement for e-voting as
done using mobile terminals at any places if the
important
fulfilled.
wireless network develops further in the forth
Considering that the security is a very important
coming days, the additional requirements for
requirement of e-voting systems, author has used
security will be required depending on the wireless
the existing solutions to achieve web service
circumstances. And the way of authentication must
security.
be provided more strongly and there should not be
as
security,
which
is
coercive voting or exposure of data in the wireless
Author of paper [3], proposed architecture for
internet voting system based on dependable web
services. Then the author modelled this system with
RBD and Reward Petri Nets, and finally evaluated
these models quantitatively. Also by looking at the
network. Voting is a key way of democracy
reflecting the nation’s intention. Therefore, a study
on security technology applied to the electronic
voting system should be progressed continuously in
the future.
results of evaluation, author can decide to use or
ISSN: 2231-5381
http://www.ijettjournal.org
Page 104
International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 3- May 2016
Author [6] proposed an internet voting
This paper [9], review the various security
protocol. The proposed internet voting protocol
attacks in computer networks such as active and
adopts blind signature to protect the content of the
passive attacks. Once the local area networks get
ballot during casting. As we believe that a secure
connected to Internet, all the attacks exploit the
electronic voting system do not only allow all
network security breaches. The network security is
voters to verify the voting result but also avoid
very complex, difficult to be designed and more
ballot buying, the proposed internet voting protocol
then all difficult to be assured. It is easier to prove
is verifiable and discourages ballot buying at the
that a network can be penetrated, than to prove that
same time. Any unauthorized candidate or party
it is completely sure. Security system is expensive
can still try to buy ballots during the election.
and introduces unpleasant user limitations. The
However, no voter can prove which ballot was cast
security system does not grow the network
by him/her after the declaration of the election
performance, but the threats are real and the risk is
result. In other words, ballot buying may still exist,
too big without a proper security policy.
but the ballot buyer cannot be assured that the voter
EXISTING
will mark the ballot as the buyer want.
SYSTEM
AND
DISADVANTAGES
Dr. Michael Shamos of CMU provides a
sharp counterpoint [7] to Neumann and Mercuri's
views. While his Six Commandments summary of
requirements for a voting system is very similar to
others' requirements, he's less afraid of the
catastrophic failures and sweeping fraud made
possible by imperfections in electronic voting
machines actually occurring in a real election.
Shamos is also much less impressed with paper
ballots than are Neumann and Mercuri. The author
places a great deal of faith in decentralization to
make fraud difficult to commit and easy to detect.
Dr.Shamos even likes DRE machines.
Rebecca
Mercuri
―Mercuri method‖
[8]
Vote Verification through Open Standard: a
Roadmap sought to propose a vote verification
technique which would able to verify vote against
major possible threats and enables all election
participants to verify votes. For this purpose, they
need to investigate a combination of both
technological and procedural solutions
An Architecture for E-Voting Systems Based on
Dependable Web Services proposed design for e
voting systems based on dependable web services.
The results got from the analysis of the evaluation
of the proposed design, presented that solution,
invented
the
for electronic voting. A
increase the dependability to a great extent.
Ensuring
Voters
and
Candidates’
critical component of this method is very similar to
Confidentiality in E-voting Systems proposed an
the Caltech/MIT proposal: a voting machine must
E-voting procedure which ensures voters and
produce human-readable hardcopy paper results,
candidate’s confidentiality and accuracy. Many
which can be verified by the voter before the vote is
issues still exist, for example, when large number
cast, and manually recounted later if necessary. The
of voters cast their ballots at the same time, will it
author philosophy and Neumann's are very similar;
cause denial of service (DOS) in the Internet? How
in fact, they've written papers together on the
to design an efficient and secure online voting
subject.
system?
ISSN: 2231-5381
http://www.ijettjournal.org
Page 105
International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 3- May 2016
The proposed deign in paper A Study on the
signature that ensures integrity of the vote cast by
Electronic Voting System using blind Signature
voter and authentication of voter at the two levels.
for Anonymity contains that the voting can be
Design of secure e-voting system over a network is
done only at the places where the voting places are
indeed a very difficult task as all the requirements
installed. Though voting can be done using mobile
of the voting system have to be met.
terminals at any places if the wireless network
develops further in the forthcoming days, the
Failure to ensure even one of the specifications can
additional requirements for security will be
lead to chinks and glitches that can be exploited by
required depending on the wireless circumstances.
a middleman to forge or manipulate the intricate
details. Subsequently, the Result of the election is
A Verifiable Electronic Voting Scheme over the
computed from the sum of the votes which is
Internet proposed an internet voting protocol. The
jointly decrypted by the authorities. A voting
proposed internet voting protocol adopts blind
scheme must ensure that the voter can keep his vote
signature to protect the content of the ballot during
private.
casting. As we believe that a secure electronic
voting system do not only allow all voters to verify
the voting result but also avoid ballot buying, the
proposed internet voting protocol is verifiable and
Advantages
Provides Security from all types of attacks
when vote is travelling from voting client to
voting server
discourages ballot buying at the same time. Any
unauthorized candidate or party can still try to buy
Security threats from passive as well as security
threats from active intruder are addressed here.
ballots during the election. However, no voter can
We can also use this system for taking the
prove which ballot was cast by him/her after the
opinion of a voter on certain issue.
declaration of the election result. In other words,
Saves money and time compared to traditional
ballot buying may still exist, but the ballot buyer
bvoting system. Reduces the counting time of votes
cannot be assured that the voter will mark the ballot
since the results here can be declared instantly.
as the buyer want.
Anatomy
and
Types
of
Attacks
against
System Architecture Diagram
Computer Networks review the various security
attacks in computer networks such as active and
passive attacks. Once the local area networks get
connected to Internet, all the attacks exploit the
network security breaches. The network security is
very complex, difficult to be designed and more
than all difficult to be assured. It is easier to prove
that a network can be penetrated, than to prove that
it is completely sure.
III. OUR APPROACH
The approach suggests a practical application of the
existing
cryptographic
ISSN: 2231-5381
schemes
and
digital
http://www.ijettjournal.org
Page 106
International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 3- May 2016
IV.CONCLUSION
The conclusion of this paper is that online e-voting
system provides a secured Internet voting using the
concept of digital signature and multiple
encryptions. It also fulfils the various security
features such as authentication, integrity, nonrepudiation. This system saves money, time
requirement in traditional voting system.
V.REFERENCE
[1] Ali Fawzi Najm Al-Shammari, Sergio Tessaris" Vote
Verification through Open Standard: A Roadmap”, 978-14577-0953-1/11IEEE2011.
[2] Amir Omidi and Mohammad Abdollahi Azgomi, “An
Architecture for E-Voting Systems Based on Dependable
Web Services” 978-1-4244-5700-7/10 ©2009 IEEE.
[3] Amir Omidi, Saeed Moradi “Modeling and Quantitative
Evaluation of an Internet Voting System Based on
Dependable WebServices”, 978-1-4673-0479-5/12/©2012
IEEE.
[4] Haijun Pan, Edwin Hou and Nirwan Ansari” Ensuring
Voters and Candidates’ Confidentiality in E-voting
Systems” 978-1-61284-680-4/11/$26.00 ©2011 IEEE.
[5] Seo-Il Kang and Im-Yeong Lee “A Study on the Electronic
Voting System using blind Signature for Anonymity”, IEEE
2006 International Conference on Hybrid Information
Technology (ICHIT'06) 0-7695-2674- 8/06.
[6] Chun-Ta Li, Min-Shiang Hwang , Yan-Chi Lai “A
Verifiable Electronic Voting Scheme Over the Internet”,
2009 Sixth International Conference on Information
Technology: New Generations.
[7] Lazaros Kyrillidis, Sheila Cobourne, Keith Mayes, Song
Dongy and Konstantinos Markantonakis” Distributed eVoting using the Smart Card Web Server” 978-1-46733089-3/12@ 2012 IEEE.
[8] Y ousfi Souheib, Derrode Stephane, “Watermarking in evoting for large scale
3/12/$31.00 ©2012 IEEE.
election”,
978-1-4673-1520-
[9] Prof. Emil Sofron, Prof. Ion Tutanescu, “Anatomy and
Types of Attacks against Computer Networks”, 978-14673- 1520-3/12/$31.00 ©2012 IEEE.
ISSN: 2231-5381
http://www.ijettjournal.org
Page 107
Download