Secured Aadhar Based E-Voting Application using RSA
B.Bhaskar Rao1, P.Chandra Sekhar2, V. Sunil Kumar3, K. Sandeep Varma4
1Dr B Bhaskara rao is Associate Professor in Department of CSE, Gitam University, Visakhapatnam, Andhra Pradesh, India.
2Dr P.Chandra Sekhar is Associate Professor in Department of CSE, Gitam University, Visakhapatnam, Andhra Pradesh, India.
3V. Sunil Kumar is Assistant Professor in Department of CSE, Gitam University, Visakhapatnam, Andhra Pradesh, India.
4K.Sandeep Varma is Assistant Professor in Department of CSE, Gitam University, Visakhapatnam, Andhra Pradesh, India.
Manuscript received on September 16, 2019. | Revised Manuscript received on 24 September, 2019. | Manuscript published on October 10, 2019. | PP: 2909-2913 | Volume-8 Issue-12, October 2019. | Retrieval Number: K17650981119/2019©BEIESP | DOI: 10.35940/ijitee.K1765.1081219
Open Access | Ethics and Policies | Cite | Mendeley | Indexing and Abstracting
© The Authors. Blue Eyes Intelligence Engineering and Sciences Publication (BEIESP). This is an open access article under the CC-BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/)
Abstract: The invasion of wireless, mobile phones and various internet technologies has resulted in the new implementation, making the e-voting method very quiet and effective. The E-voting ensures the option of a suitable, simple and secure manner of incarceration and the complete number of votes in an election. This study work offers the e-voting requirements and necessities using a platform based on Android or the internet. E-voting implies voting through electronic devices or websites in the election. An e-voting application is developed using the android or web platform. This request enables the user cast the ballot without going to the polling booth. To prevent fraud respondents using the scheme, the application utilizes adequate authentication steps. Once the polling process is completed in the electronic device, the outcomes can be obtained in a fraction of seconds instantly. All voting counts of applicants are encrypted using RSA and stored in the database to prevent third-party attack and disclosure of outcomes. Upon completion of the meeting, the admin can decrypt the count of votes and publish the outcome and finish the voting process.
Keywords: E-Voting, RSA, Encryption, Decryption
Scope of the Article: Encryption Methods and Tools