Cryptography Implementation for electronic voting security
نویسندگان
چکیده
Electronic voting is done by recording election data centrally and presenting it into fast digital information. E-voting an internet technology, which aims to improve the performance of process, expected be a breakthrough in technological development that helps human work. Security constraints e-voting include distribution voting, for example voters who distribute rights, are illegitimate can abuse voters’ because they know voter’s account access system. This study implements cryptographic methods as password security voter accounts, results so secrecy maintained. RSA algorithm implement techniques based on two mathematical problems, namely factorization modulo operations composite numbers, use different keys encryption decryption processes. The public key used process encode text, private description translating ciphertext plaintext.
منابع مشابه
Secure Electronic Voting with Cryptography
In recent years, computer and network-based voting technologies have been gradually adopted for various elections. However, due to the fragile nature of electronic ballots and voting software, computer voting has posed serious security challenges. This chapter studies the security of computer voting and focuses on a cryptographic solution based on mix-nets. Like traditional voting systems, mix-...
متن کاملElectronic Voting: Security Issues
This paper covers the some of the security issues in current electronic voting systems. There are many problems with current electronic voting systems . The certification of systems in the USA is done without public input, and the resulting certification reports are kept secret. Many machines lack external audit capabilit ies such as a voter verifiable paper trail. Many systems can be easily ha...
متن کاملElectronic Voting Protocol Using Identity-Based Cryptography
Electronic voting protocols proposed to date meet their properties based on Public Key Cryptography (PKC), which offers high flexibility through key agreement protocols and authentication mechanisms. However, when PKC is used, it is necessary to implement Certification Authority (CA) to provide certificates which bind public keys to entities and enable verification of such public key bindings. ...
متن کاملSecurity Considerations for Remote Electronic UOCAVA Voting
[This page intentionally left blank. ] This document has been prepared by the National Institute of Standards and Technology (NIST) and describes research in support military and overseas voting for the Election Assistance Commission and the Technical Guidelines Development Committee. It does not represent a consensus view or recommendation from NIST, nor does it represent any policy positions ...
متن کاملInternet Voting System Security Auditing from System Development through Implementation: Best Practices from Electronic Voting Deployments
There are many security challenges associated with the use of Internet voting solutions. While we are not advocating for the use of Internet voting in this paper, we do assert that if an Internet voting solution is going to be used, its deployment must be undertaken with continuous security auditing in place – security auditing that begins with the development of the Internet voting system by t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: E3S web of conferences
سال: 2021
ISSN: ['2555-0403', '2267-1242']
DOI: https://doi.org/10.1051/e3sconf/202132803005