International Core Journal of Engineering 2020-26 | Page 68
3) The validator and the indicator have a very important
role in this scheme because if they do not interact in a
correct way they will not be able to protect the voter's
data. To obtain greater security and privacy, the
validator, indicator and the voter's machine must be
run on separate machines [6].
(Electronic Marking Language) format that fits the
requirements of the Swiss government. The security of this
system is based on the Information Security Management
System (BS7799). The encryption that is done is two steps:
x The voter's device encrypts the voter’s vote and data
through an SSL channel with an encryption of 1,024
bits.
(4) Electronic votes in the country Switzerland (Europe)
In Switzerland-Zurich, a study was carried out from 1998
to 2006, which ended with the pilot tests of an electronic
voting system developed in the same Canton mentioned. This
system allows you to make the payment through cell phones
thanks to a SIM card or via the Internet because in Zurich you
have a dedicated VPN for this canton called LeuNet and the
data that will be sent and imported will take an ELM
x The electronic voting system is responsible for
verifying the data and then re-applying another
1,024-bit encryption, so that they can be transferred to
the vote storage database [9].
The steps that are carried out for the electronic voting
process are shown in Fig. 2:
Fig. 3. Operation of electronic voting in Zurich.
In Fig. 2 the following is executed:
server to authenticate voters’ personal information, send a list
of candidates to the voters and also receive encrypted ballots
with a public key.
1) The voter proceeds to register in an electronic list.
2) An email will be received with a password designed
exclusively for this electoral process.
One of the main advantages of using voting machines is
the action of making counts automatically, so the risk of errors
will be drastically reduced. As in most electronic voting
systems this works through a distributed architecture, it will
have several servers where it will distribute its processing.
Servers can be both to store the incoming votes and to store
credentials that validate that such person made his vote. To
encrypt the data that will go to the vote count, cryptography is
used to generate a public key and to decrypt the information it
is done by means of a private key [11].
3) The voter carries out the payment in any medium such
as computers, PDA / WAP, or mobile phone.
4) The voter proceeds to send the results to the voter
registration software.
5) A vote counting is performed on the server’s side.
6) The votes made are shown by a statistic.
(5) Electronic votes in the country Mauritius (East
Africa)
The architecture used in Mauritius has been designed
taking into account the environment, infrastructure,
geographic size, economy and the amount of population. The
system implemented is the Smartmatic model. The system
adapts to different climates, and the effectiveness of this
system that uses cryptography of public keys and fingerprints
for voter authentication has already been demonstrated.
Voters will use a touch screen on the voting machine by which
they must authenticate themselves through a biometric system
before gaining access to the voting system, using a network
(6) Functioning of Distributed Architecture
A distributed system eliminates the direct physical
interaction with the system since everything is handled in a
virtual way, which guarantees a better process and integrity in
the processes of votes managing in an adequate way so that
there is no collision in the servers keeping the whole process
in an equitable way [13]. This architecture is essential to apply
electronic voting, this helps to distribute the processes that
should have the voting, such as counting, saving receipts, save
data to access the systems.
46