Secured Internet Voting System Based on Combined DSA and Multiple DES Algorithms
Internet Voting with the widespread use of Internet is becoming increasingly appealing to groups in place of paper based elections or vote-by-mail elections to geographically distributed voters, as more people are gaining access to the Internet. However, I-Voting systems should be designed carefully or otherwise they may corrupt results or violate voters privacy. This paper proposes the concept of Internet Voting using combined Digital Signature Algorithm and Multiple Data Encryption Standard Algorithm that supports every phase of the electoral process to ensure its security, privacy and transparency. The idea of using security algorithms is to provide a secure method to encrypt and sign data. First the Digital Signature Algorithm is used to generate digital signature that is used as a key for Data Encryption Standard Algorithm. The random number and Digital Signature are send to authorized person using a secure channel. Then Data Encryption Algorithm is applied random number of times for obtaining Multiple Data Encryption Standard. In this work, the aspects and risks involved in Internet Voting architectures are considered and a solution is derived for better usage. The Secured Internet Voting System is simulated and the test results show that the proposed system is secured and flexible. The function of this system is to maintain the most basic principles of an elector process, such as secrecy, correctness, anonymity, non-coercion.
KeywordsInternet Voting(I-Voting) Digital Signature Algorithm(DSA) Multiple Data Encryption Algorithm(MDES) Data Encryption Standard Algorithm (DES) The Secured Internet Voting System(SIVS)
Unable to display preview. Download preview PDF.
- 1.Kohno, T., Stubblefield, A., Rubin, A.D., Wallach, D.S.: Analysis of an Electronic Voting System. In: IEEE Symposium, pp. 27–40 (2004)Google Scholar
- 2.Parhami, B.: Voting Algorithms. IEEE 43(4), 617–629 (1994)Google Scholar
- 3.Ryan, F.B.: The Electronic Voting System for the United States House of Representatives. IEEE 5, 32–37 (1972)Google Scholar
- 4.Lambrinoudakis, C., et al.: Electronic Voting Systems: Security Implications of the Administrative Workflow. IEEE, 467–471 (2003)Google Scholar
- 5.Digital Signature Standard, NIST, U.S. Department of Commerce, FIPS PUB 186 (May 1994) Google Scholar
- 6.Stallings, W.: Cryptography and Network Security-Principles and Practices, 4th edn. Pearson (2007)Google Scholar
- 7.Aboud, S.J., Al-Fayoumi, M.A., Al-Fayoumi, M., Jabbar, H.: An Efficient RSA Public Key Encryption Scheme. IEEE, 127–130 (2008)Google Scholar
- 8.Ray, I., Ray, I., Narasimhamurthi, N.: An Anonymous Electronic Voting Protocol for Voting Over The Internet. IEEE, 1–6 (2001)Google Scholar
- 9.Davis, R.: The data encryption standard in perspective. IEEE 16(6), 5–9 (1978)Google Scholar
- 11.Centinkoya, O.: Analysis of Security Requirement of Cryptographic Voting Protocols (Extended Abstract). IEEE, 1451–1456 (2008)Google Scholar
- 12.Yacoub, S., Lin, X., Simske, S., Burns, J.: Automating the Analysis of Voting Systems. IEEE, 203–214 (2003)Google Scholar