Loading

Secure EVMs Against Tampering with AES Encryption and Hashing
A V R M Koushik1, A Chandrahas Reddy2, G Avinash Reddy3, C Fancy4
1A V R M Koushik, Department of Information Technology, SRM Institute of Science and Technology, (Tamil Nadu), India.
2A Chandrahas Reddy, Department of Information Technology, SRM Institute of Science and Technology, (Tamil Nadu), India.
3G Avinash Reddy, Department of Information Technology, SRM Institute of Science and Technology, (Tamil Nadu), India.
4Ms.C Fancy, Assistant Professor, Department of Information Technology, SRM Institute of Science and Technology, (Tamil Nadu), India.
Manuscript received on 15 July 2019 | Revised Manuscript received on 24 July 2019 | Manuscript Published on 01 August 2019 | PP: 31-35 | Volume-8 Issue-4S2, April 2019 | Retrieval Number: D10090484S219/19©BEIESP | DOI: 10.35940/ijeat.D1009.0484S219
Open Access | Editorial and Publishing Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)

Abstract: Conducting elections in a country where population is increasing rapidly like wildfire, is the most challenging aspect for the government. Some people take advantage of this aspect and create disturbances by involving in tampering the Electronic Voting Machines (EVMs). This is a situation the authorities face in conducting elections, which is emerging as a problem to be taken care with an utmost priority. This paper presents a method to know if the EVMs have tampered or not and when the EVM is tampered if they are found to be tampered. This method uses the powerful AES Algorithm, an advanced symmetric key cryptographic technique that provides better security and efficiency. It is paired with various hashing algorithms (MD5, SHA-1, SHA-256, and Whirlpool) for validation. Hence, the proposed model defines a unique way to secure the EVMs from tampering. In addition, the method is experimented with various key sizes and hashing algorithms.
Keywords: Cryptography, Hashing, Encryption, EVM.
Scope of the Article: Secure Mobile and Multi-Agent Systems