Open Access   Article Go Back

AES Based Online Voting System

Lalit Kumar Gupta1 , Utkarsh Tiwari2 , Ajay Kumar3 , Saumya Jaiswal4

Section:Survey Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 915-918, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.915918

Online published on Mar 31, 2019

Copyright © Lalit Kumar Gupta, Utkarsh Tiwari, Ajay Kumar, Saumya Jaiswal . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Lalit Kumar Gupta, Utkarsh Tiwari, Ajay Kumar, Saumya Jaiswal, “AES Based Online Voting System,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.915-918, 2019.

MLA Style Citation: Lalit Kumar Gupta, Utkarsh Tiwari, Ajay Kumar, Saumya Jaiswal "AES Based Online Voting System." International Journal of Computer Sciences and Engineering 7.3 (2019): 915-918.

APA Style Citation: Lalit Kumar Gupta, Utkarsh Tiwari, Ajay Kumar, Saumya Jaiswal, (2019). AES Based Online Voting System. International Journal of Computer Sciences and Engineering, 7(3), 915-918.

BibTex Style Citation:
@article{Gupta_2019,
author = {Lalit Kumar Gupta, Utkarsh Tiwari, Ajay Kumar, Saumya Jaiswal},
title = {AES Based Online Voting System},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {915-918},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3939},
doi = {https://doi.org/10.26438/ijcse/v7i3.915918}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.915918}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3939
TI - AES Based Online Voting System
T2 - International Journal of Computer Sciences and Engineering
AU - Lalit Kumar Gupta, Utkarsh Tiwari, Ajay Kumar, Saumya Jaiswal
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 915-918
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
443 296 downloads 149 downloads
  
  
           

Abstract

In this time of technological advancement everything is online and so is the voting. The online voting is time saving, efficient, reliable and fast. The online voting requires safety for the communication setup between client and server so for that purpose Kerberos protocol is used in the voting process for the authentication purpose which uses DES cryptography but DES is not secure enough to handle highly valuable data used in voting so in order to make it more secure we need to replace DES with some other cryptography technique. Kerberos uses DES by default, but it easy to decrypt so to enhance its security we need to replace it with AES cryptography. So here in this paper, we will discuss AES cryptography as the replacement of DES and its implementation with Kerberos. As AES is mathematically more efficient than DES other than that it allows choosing a 128-bit, 192-bit or 256-bit key as compared to the 56-bit key of DES thus making it exponentially stronger.

Key-Words / Index Term

DES, AES, NIST, IDEA, BDB, HMAC, CBC

References

[1] Kerberos Overview- An Authentication Service for Open Network Systems, Document ID:16087
[2] S. P. Everett, M. D. Byrne, and K. K. Greene, "Measuring the usability of paper ballots: Efficiency, effectiveness, and satisfaction", Proceedings of the Human Factors and Ergonomics Society 50th Annual Meeting, (2006) October 16-20; Santa Monica, USA
[3] S. P. Everett, K. K. Greene, M. D. Byrne, D. S. Wallach, K. Derr, D. Sandler, and T. Torous, "Electronic Voting Machines versus Traditional Methods: Improved Preference, Similar Performance", CHI Proceedings: Measuring, Business, and Voting, (2008) April 5-10; Florence, Italy.
[4] M. Patil, V. Pimplodkar, A. R. Zade, V. Vibhute and R. Ghadge, “A Survey on Voting System Techniques”, International Journal of Advanced Research in Computer Science and Software Engineering, vol. 3, no. 1, (2013).
[5] Diffie, Whitfield; Hellman, Martin (8 June 1976). "Multi-user cryptographic techniques". AFIPS Proceedings. 45: 109–112
[6] Jindal, S., & Sharma, M. (2016). Design and Implementation of Kerberos using DES Algorithm, 92–95.
[7] Robert Sugarman (editor) (July 1979). "On foiling computer crime". IEEE Spectrum
[8] Voting methods in Estonia: Statistics about Internet Voting in Estonia VVK.
[9] Forman, G. 2003. An extensive empirical study of feature selection metrics for text classification. J. Mach. Learn. Res. 3 (Mar. 2003), 1289-1305.
[10] Lalit Kumar Gupta, Utkarsh Tiwari, Manoj Kumar Chaudhary, Kuldeep Kasaudhan, "Secure Voting Using Bio-metric Authentication", International Journal of Computer Sciences and Engineering, Vol.7, Issue.2, pp.731-735, 2019.