Author : Reshmi Krishna Prasad 1
Date of Publication :7th April 2016
Abstract: Cryptosystem is one of the most discussed areas in today’s digital scenario. The increasing use of pervasive devices in the field of electronics has raised the concerns about security. In embedded applications, implementing a full-fledged cryptographic environment would not be practical because of the constraints like security, power dissipation, area and cost. Due to these constraints, the focus is on using lightweight cryptography that needs as less memory space as possible. The main criteria for the lightweight cipher are to have high security and less memory space. The lightweight cryptography is a biometric key generation algorithm with the combination of PRESENT algorithm with group instruction permutation. The developed lightweight algorithm is implemented with biometric system i.e. finger print scanning. This is used to ensure the high security to avoid fake, repeated voting etc. It also enhances the accuracy and speed of the process. The system utilizes the RFID card as an identification card for each voter. Each voter ID card contains a unique ID number with corresponding fingerprints stored in the database .The system uses thumb impression for voter identification since it is unique for each individual. Thus it would have an edge over the present day voting systems. The system confirm that the voting rights are accessed only by a legitimate user. In this, creation of a database consisting of unique ID number and thumb impressions of all the eligible voters in a constituency is done as a pre-poll procedure. During election, RFID card is used for initial authentication. Once the authentication succeeds, the thumb impression of the voter is entered as input to the system. This is then compared with the available records in the database. Access to cast a vote is granted if the particular pattern matches with anyone in the available record. In case the pattern does not match with the records of the database or in case of repetition, access to cast a vote is denied or the vote gets rejected and total vote count is done. The designing language is MATLAB, VHDL and embedded C. The code is synthesized and simulated using Xilinx ISE 13.2 and is implemented using FPGA and Microcontroller.
Reference :
-
[1] Syed Mahmud Hasan, Arafa Mohd. Anis, Hamidur Rahman, Jennifer Sherry Alam, Sohel Islam Nabil, Md. Khalilur Rhaman, “Development of Electronic Voting Machine with the Inclusion of Near Field Communication ID Cards and Biometric Fingerprint Identifier,” IEEE 17th Conf. on Computer and Information Technology, 22-23 December 2014.
[2] B. Madan Mohan Reddy, D. Srihari “RFID Based Biometric Voting Machine Linked To Aadhaar For Safe And Secure Voting” International Journal of Science, Engineering and Technology Research (IJSETR) Volume 4, Issue 4, April 2015.
[3] Gaurav Bansod, Nishchal Raval, Narayan Pisharoty “ Implementation of a New Lightweight Encryption Design for Embedded Security” IEEE Trans. On Information Forensics and Security, vol. 10, no.1, January 2015.
[4] S.Sabeen, N. Bharathi Raja “Enhanced Memory Reliability Using Parity Matrix Code,” International Journal of Scientific & Engineering Research, Volume 5, Issue 4, April-2014.
[5] A. Juels and S. A. Weis, “Authenticating pervasing devices devices with human protocols,” in Advances in Cryptology. Berlin Germany: Springer- Verlag, pp. 293- 308, 2005.
[6] A . Bogdanov , “ PRESENT- An ultra- lightweight block cipher,” in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), vol. 4727, Pp, 450- 466 Springer-Verlag, 2007.
[7] D. Hong, “HIGHT: A new block cipher suitable for low resource device,” in Cryptographic Hardware and Embedded Systems (Lecture Notes in Computer Science), vol. 4249, l. Goubin and M. Matsui , Eds. Berlin, Germany : Springer- Verlag, pp 46- 59, 2006,.
[8] D. J. Wheeler and R. M Needham, “ TEA, a tiny encryptin algorithm,” in Fast Software Encryption, vol. 1008, Springer- Verlag 1994.
[9] F-X. Standaert, G. Rouvroy, Quisquater, and J-D. Legat, “ ICEBERG: An involutional cipher efficient for block encryption in reconfigurable hardware,” in Fast Software Encryption, B. Roy and W. Meier, Eds. Berlin Germany: Springer- Verlag, pp. 363- 366,2004.