CFP last date
20 May 2024
Reseach Article

A Hash Algorithm based Approach for Verifiability and Detection of EVM Tampering

by Bhople Yogesh Jagannath
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 184 - Number 3
Year of Publication: 2022
Authors: Bhople Yogesh Jagannath
10.5120/ijca2022921981

Bhople Yogesh Jagannath . A Hash Algorithm based Approach for Verifiability and Detection of EVM Tampering. International Journal of Computer Applications. 184, 3 ( Mar 2022), 1-3. DOI=10.5120/ijca2022921981

@article{ 10.5120/ijca2022921981,
author = { Bhople Yogesh Jagannath },
title = { A Hash Algorithm based Approach for Verifiability and Detection of EVM Tampering },
journal = { International Journal of Computer Applications },
issue_date = { Mar 2022 },
volume = { 184 },
number = { 3 },
month = { Mar },
year = { 2022 },
issn = { 0975-8887 },
pages = { 1-3 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume184/number3/32310-2022921981/ },
doi = { 10.5120/ijca2022921981 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-07T01:20:29.791838+05:30
%A Bhople Yogesh Jagannath
%T A Hash Algorithm based Approach for Verifiability and Detection of EVM Tampering
%J International Journal of Computer Applications
%@ 0975-8887
%V 184
%N 3
%P 1-3
%D 2022
%I Foundation of Computer Science (FCS), NY, USA
Abstract

A comprehensive and efficient hash algorithm-based approach is proposed to detectthe tampering of Electronic Voting machines (EVM). There are two cases where a particular EVM machine can be tampered. Either embedded program stored in ROM whichis used during the overall voting process can be tampered with to behave maliciously before the start of the casting of votes or Memory Unit (MU) which stores the casted votes can be tampered after the voting ends and before counting .Hash algorithm based solution is provided for both the above-mentioned cases to detect the tampering.

References
  1. NISTstd.FIPS180-2, Secure Hash Standard (SHS), National Institute of Standard and Technology (NIST),Oct. 2001
  2. Florent Chabaud, Antoine Joux, “Differential collisions in SHA-0,” Advances in Cryptology-CRYPTO’98, LNCS 1462, SpringerVerlag,1998.
  3. William Stallings, “Cryptography and Network Security: Principles and Practice. Third edition, Prentice Hall.2003
  4. Website of Election commission of India , https://eci.gov.in/ accessed on 12 Dec 2021
  5. Website of Maharashtra State Election Commission,https://mahasec.maharashtra.gov.in /accessed on 12 Dec 2021.
  6. Abdulaziz Ali, Alkandari, ImadFakhri Al- Shaikhli, Mohammad A. Alahmad, “Cryptographic Hash Function: A High Level View”,International Conference on Informatics and Creative Multimedia,IEEE,2013.
  7. Liu Jian-dong, Tian Ye, Wang Shu-hong, Yang Ka , “A fast new one-way cryptographic hash function” , IEEE International Conference on Wireless Communications, Networking and Information Security, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Hash Value Electronic Voting Machine (EVM) Memory Unit (MU) Control Unit (CU) VoterVerifiablePaperAuditTrail(VVPAT) Tampering SecureHashAlgorithm(SHA)