2 research outputs found

    Provider independent cryptographic tools

    Get PDF
    This aim of this research is to provide a library of cryptographic tools which can be used for teaching and further research. The library consists of cryptographic algorithms that include symmetric and asymmetric encryptions, key exchange, hashing algorithms and digital signature algorithms. The library is implemented by using Java cryptographic service provider framework that conforms to Java Cryptographic Architecture (JCA) and Java Cryptographic Extension (JCE). The library is developed using Software Development Life Cycle (SDLC), supported by Unified Modeling Language (UML) for the design. The programming language used is Java JDK1.4.1

    Secure E-Voting With Blind Signature

    Get PDF
    With a rapid growth in computer networks, many people can access the network through the Internet and therefore an electronic voting can be a viable alternative for conducting an election. Electronic voting system must attempt to achieve at least the same level of security as ordinary elections. We have developed an electronic voting system, E-Voting for a general election. E-Voting system employs cryptographic techniques to overcome the security issues in the election process. In this system, voter’s privacy is guaranteed by using a blind signature for confidentiality and voter’s digital signature for voter’s authentication. E-Voting is implemented by employing Java socket technology and BouncyCastle cryptography provider. The provider, which is an open source library, is used to provide the secure communication channel. The voter’s private key for digital signature is protected by using password-based encryption with SHA and Twofish-CBC algorithm so that only valid voter can use it
    corecore