Professional Documents
Culture Documents
Evoting, 2023
Evoting, 2023
ABSTRACT
Election is a fair decision making process by an authorized group of individuals to elect a person or a party
to provide them power to take further decisions for the welfare of the voted people. Traditionally, elections
were conducted using Ballot-paper system which is less efficient with a threat of confusion, tampering of
votes and more time-consuming. In the digital world, Electronic Voting Systems (EVS) are introduced
which are less time-consuming, efficient and prevent tampering of votes. Several research works have
invaded different EVS such as Mix-net Based e-voting, Homomorphic e-voting, Blockchain e-voting etc
using cryptographic tools. This paper draws attention towards developing an Electronic voting model
applying a modified classical cipher and RSA cryptosystem. The developed method is implemented using a
C++ program. The performance of the developed E-Voting System is analyzed in terms of the security
provided, time and memory requirements.
Keywords: Cryptology; Electronic Voting; Affine-Hill Cipher; Quadratic residues; RSA
Figure 1: Cryptology
1568
Journal of Theoretical and Applied Information Technology
28th February 2023. Vol.101. No 4
© 2023 Little Lion Scientific
This field uses several concepts from developing an E-Voting System is conveyed in
mathematical subjects such as number theory, linear [5][4].
algebra, etc., to develop ciphers that are not
Several research works are carried out
vulnerable to attacks. In the ancient period, classical
concerning the advancement and analysis of
ciphers such as Caesar, Affine, Hill, Playfair etc
classical ciphers for applications[6][7]. Affine-Hill
were developed for carrying out communication.
Cipher is applied in cryptosystem for securing
With the rise in technology, modern cryptosystems
digital images [8]. Many research works are carried
such as AES and DES were designed to meet the
out to upgrade the security of the Classical Ciphers.
memory and security requirements. Different types
In [9], a more robust version of Hill Cipher is
of cryptanalytic attacks can be carried out on a
designed, making use of a combination of keys
developed cryptosystem to trace the information.
along with a permutation. In [10], an enhanced
Designing cryptosystems and dishonest attacks to
Classical cipher is designed resistant to the Known-
hack the information go hand in hand. Thus, the
plaintext attack (KPA), which is time-saving. In
development of compatible ciphers is still a
[11], a technique based on the said cipher is
welcoming task.
developed for image encryption using a self-
invertible key matrix making the algorithm
computationally less complex. In [12], a public key
Cryptology experiences a lot of real-time
cryptosystem with reduced time and space
applications. The secure cryptosystems are
complexity is developed using the Affine-Hill
responsible for the smooth functioning of safe
cipher and Fibonacci matrix.
money transfers in the Banking sector, Electronic
Voting Machines to conduct fair elections, ATMs to
dispense and deposit cash, secret message transfers
In [13], a block cipher is developed by altering
in Defense and many more. This paper focuses on
the classical Hill cipher. The so developed cipher
developing efficient Electronic Voting System
creates confusion making it resistant to KPA and
applying mathematical and cryptographic tools.
retains Avalanche effect. In [14], a secure variant of
the Hill cipher is developed by using Affine-Hill
Cipher where the Affine-Hill Cipher does not
An Electronic Voting System helps to cast and
undergo the conventional computations. This
count the votes casted in the favor of a nominee
variant is resistant to KPA, Cipher Text Only
electronically. It ensures that the elections are
Attack, Chosen Plaintext Attack and Chosen Cipher
conducted in a fair manner by allowing only the
text Attack. In [15], an upgraded version of the
authorized voters to cast their vote anonymously
Affine-Hill Cipher is developed which applies the
preserving privacy. The main security aspects taken
mathematical concept of Fibonacci matrix and its
into consideration for developing a strong
eigen values ensuring the security of the cipher.
Electronic Voting Model are Privacy, Anonymity
and Verifiability. Privacy guarantees the secrecy of The algorithm applied in designing the E-Voting
vote from others. Anonymity assures that secrecy of System in this paper employs an RSA cryptosystem
the voter. Verifiability includes individual, and an upgraded Affine-Hill Cipher using the
Universal and eligibility. Individual verifiability mathematical concept of Quadratic Residues.
permits a voter to verify whether his/her vote is
considered in the final election results. Universal
Verifiability permits the voters or the election 1.1 RSA Cryptosystem
organizers to verify whether the final election
RSA is an asymmetric cryptosystem whose
results correspond to the votes casted. Eligibility
Verifiability permits the voters and the election security relies on the Integer Factorization Problem
organizers to verify the authenticity and the non- [16][17]. The algorithm to encrypt data using RSA
is:
duplication of a vote. Cryptographic algorithms are
established to conduct fair elections by retaining the Select two large primes 𝑝 and 𝑝 .
verifiability, privacy and anonymity of the casted
votes. Several E-Voting models are proposed Calculate 𝑚 = 𝑝 ∗ 𝑝 .
balancing the security and efficiency aspects Select an integer 𝑘 ∋1<𝑘 <
[1][2][3]. In [4], various Electronic Voting models 𝑚 𝑎𝑛𝑑 gcd 𝑘 , ∅(𝑚) = 1.
are compared and their analysis is carried out. The
requirements for future research direction in Calculate 𝑘 ∋ 𝑘 ∗ 𝑘 ≡ 1 𝑚𝑜𝑑 ∅(𝑚) .
1569
Journal of Theoretical and Applied Information Technology
28th February 2023. Vol.101. No 4
© 2023 Little Lion Scientific
In this paper, we work on Quadratic Residues 2.2 Encryption and Decryption process
modulo a prime to develop an upgraded version of
the Affine-Hill Cipher that is applied in the E-
Step 1: Select a prime number such that the total
Voting System to achieve efficiency, privacy,
anonymity and universal verifiability. number of quadratic residues modulo is greater
than i.e. .
1570
Journal of Theoretical and Applied Information Technology
28th February 2023. Vol.101. No 4
© 2023 Little Lion Scientific
1571
Journal of Theoretical and Applied Information Technology
28th February 2023. Vol.101. No 4
© 2023 Little Lion Scientific
𝑎 𝑎 𝑎 19 (𝑎 + 𝑎 + 𝑎 )𝑚𝑜𝑑 𝑛 19
𝑏 𝑏 𝑏 ∗ 5 + (𝑏 + 𝑏 + 𝑏 )𝑚𝑜𝑑 𝑛 For 𝑛 = 29, 𝑝 = 71, plain text: 5 and key
𝑐 𝑐 𝑐 1 (𝑐 + 𝑐 + 𝑐 )𝑚𝑜𝑑 𝑛 1
17 1 26 15
10 matrices, 𝐾 = 23 19 24 𝑎𝑛𝑑 𝐾 = 8 , the
= 49
5 4 3 12
28 23
obtained cipher text is 36 . On replacing the 3rd
From the above matrix representation, 3 27
equations in 3 variables are obtained which cannot character ‘A’ of the plain text by ‘E’, the obtained
be solved to obtain the key values because the 9
cipher text values are mapped to quadratic residues cipher text is 65 which differs from the previous
modulo where the value of is unknown. Also, 16
both the solutions of a Quadratic congruence lead cipher text in all the three bits. Hence, the
to the mapped Quadratic residue thus creating developed method retains Avalanche effect.
confusion. Hence, the proposed model is resistant
to the Known Plain text attack. 3. PROPOSED ELECTRONIC VOTING
Also, the proposed method is resistant to SYSTEM
the Zero Plaintext attack (ZPA) because the zero
plaintext is mapped to the quadratic residues An Electronic Voting System is a
development made in the field of science to
modulo which provide no clue to trace the key
conduct fair elections in an organization or a nation
matrices.
from any location over Internet. It must be efficient
enough to preserve privacy to vote, anonymity of
2.4.3 Frequency Analysis
the voter and security of the system. The proposed
Frequency analysis is a study of number of
architecture for E-Voting includes three major
times a character has occurred in a cipher text. This
steps−Registration, Voting, Results.
analysis helps to guess the corresponding plain text
depending upon the most occurring and rare
3.1 Registration
occurring characters in a character set. But this
The initial step in the process of
attack is possible only when same plain text
conducting elections is to register the candidates to
characters are mapped to the same cipher text
provide them the authorization to vote. This step
characters post encryption. In the proposed cipher,
sets a unique identification to every voter which
the encrypted values of the same plain text digits
ensures the authorization of the voter and the
differ making the cipher resistant to attack by
authenticity of the vote casted. Depending upon the
means of frequency analysis.
total number of registrations, different booths are
For example: For 𝑛 = 29, 𝑝 = 59, plain text =
19 17 1 26 15 organized.
5 , 𝐾 = 23 19 24 𝑎𝑛𝑑 𝐾 = 8 ,
3.2 Voting
5 5 4 3 12
9 In this step, each authorized voter is
the obtained cipher text is 65 . allowed to cast their vote against their respective
16 nominee. The encrypted version of the casted vote
is collected for counting the votes.
2.4.4 Avalanche effect
Avalanche effect is an important property
of a cryptographic algorithm which states that 3.3 Results
significant change is reflected in the cipher text The declaration of results include the
whenever the plain text undergoes a minute change. display of total number of registered voters, total
In the proposed method, change in a single number of voters who voted and the individual
character of the plain text results in the change of votes obtained by each nominee.
more than one character in the cipher text.
1572
Journal of Theoretical and Applied Information Technology
28th February 2023. Vol.101. No 4
© 2023 Little Lion Scientific
Figure 2: Registration
Figure 3: Voting
Figure 4: Results
1573
Journal of Theoretical and Applied Information Technology
28th February 2023. Vol.101. No 4
© 2023 Little Lion Scientific
The example discussed below considers three 4.2 Pseudo-code to count the votes and declare
results
nominations and the
// Values
// is a
private to the EC
function to count the number of votes casted in the
// Booth
favor of a nominee
Head generates the keys to encrypt the seed
value
//Input by
The security of the proposed architecture
the Voter
is concerned in three major hands Official
Authority, Booth Heads and Counting Officer. The
// is exchange of keys among them occurs over a secure
a function to generate key matrices as in () channel. The Distribution of keys for conducting a
// Encrypted fair Electronic Voting is depicted through the
Vote Figure 5.
1574
Journal of Theoretical and Applied Information Technology
28th February 2023. Vol.101. No 4
© 2023 Little Lion Scientific
encrypted votes and the Decryption key are result of the election by decrypting the casted votes
communicated to the counting officer over a secure with the help of the keys.
channel. The counting officer calculates the final
1575
Journal of Theoretical and Applied Information Technology
28th February 2023. Vol.101. No 4
© 2023 Little Lion Scientific
In the implemented model, the different inputs by 4.4 Time and Memory Analysis
the voters and the organizing committee are: The proposed mathematical model is implemented
Input by Official authority: using a DEV C++ compiler on an Intel CORE i3
Input by Booth Head: processor with a speed of 1.70 GHz and 4.00 GB
Input by the voters: RAM using Windows 8.1 64-bit Operating System.
The input by the official authority is responsible for The performance of the developed cryptosystem is
the establishment of the one-one correspondence measured in terms of its time and memory
between the numbers from to and the quadratic requirements. The time and memory requirements
residues modulo . The input by the booth heads is are tabulated considering a maximum of
used to generate an encryption and decryption key nominations participating in an election for the
for vote casting. The encryption key encrypts the values of and the value is chosen
seed value input by the user. The seed value between 59 and 100. The general relation stating
generates the key matrices for encrypting the votes the time and memory requirements for the proposed
casted by the voters. The encryption and decryption cipher is tabulated in the table where
key is generated by the Booth heads using RSA denote the Encryption
algorithm while the votes are encrypted applying time, Decryption time, Memory requirements while
the developed cipher in section 2. Encryption and Decryption respectively.
Table 2: Relation determining the time and memory requirements of the algorithm
Encryption Decryption
Time(in
milliseconds)
Memory(in
Bytes)
4.5 Comparative Analysis developed model against the existing models [22],
The proposed Electronic Voting Model applies the [23], [24] and [25] is tabulated in Table 3.
upgraded Classical Cipher and RSA algorithm for
encrypting votes. The comparative analysis of the
1576
Journal of Theoretical and Applied Information Technology
28th February 2023. Vol.101. No 4
© 2023 Little Lion Scientific
1577
Journal of Theoretical and Applied Information Technology
28th February 2023. Vol.101. No 4
© 2023 Little Lion Scientific
1578