Title: CSI4138CEG4394 Design of Secure Computer Systems
1CSI-4138/CEG-4394 Design of Secure Computer
Systems
- Virtual Election Booth
- Lab Project
- Jean-Yves Chouinard Fall 2002
2Secure Election Protocol
- Implementation of a secure election protocol
- Use of two central facilities
- CTF Central Tabulating Facility
- CLA Central Legitimization Agency
- Design objectives
- secure protocol for voters to vote online
- ensuring individual privacy
- No possibility of cheating the election
3Secure Election Protocol Requirements
- Only authorized voters can vote
- Authorized voters can vote only once
- All voters can verify that their vote has been
taken into account and tabulated - No one can determine for whom anyone voted
- No one can change anyone elses vote
- Everyone knows who voted and who didnt
4Central Tabulating Facility and Central
Legitimization Agency
- The CLA certifies the voters
- Each voter sends a message to the CLA requesting
a validation number. - The CLA returns a random validation number and
maintains a list of validation numbers and the
corresponding recipients. - The CLA sends the list of validation numbers to
the CTF.
5Central Tabulating Facility and Central
Legitimization Agency
- The CTF counts the votes
- The voters sends their vote to the CTF.
- The CTF checks the voters validation numbers
against the list received from the CLA if the
validation number is valid then the vote is
counted and the validation number disabled (to
prevent multiple votes from the same voter). - After all the votes are entered, the CTF publish
the election results.
6Term Project Report
- Teams of three students
- Any team member should be able to present the
report and answer all questions - Detailed 15-25 page written technical report
- Neat, readable and self-contained
- No raw computer outputs include only relevant
program exerpts (reduced properly in size) - Include all relevant references, figures tables,
diagrams, etc.
7Term Project Report Format
- Summary (1 page) motivation, literature review,
methodology used, results and general conclusion - Introduction backgraound material, scope and
limitations of the term project (secure election
protocol) - Literature review, methodology main body of the
term project report - Results description of the results (exlain all
tables, figures, flow charts, block diagrams,
listings, etc. - Conclusion general conclusion, limitations,
recommendations for future implementations - References include the references used and
relevant to this project all entries must be
completed - Appendices as needed support the main body of
the report
8References
SCHN96 Applied Cryptography Protocols,
Algorithms, and Source Code in C (2nd edition),
Bruce Schneier, John Wiley and Sons, New-York,
1996. SALO96 Public-Key Cryptography, Arto
Salomaa, Springer Verlag, New-York,
1996. STAL99 Cryptography and Network Security
Principles and Practice, William Stallings (2nd
edition), Appendix A, Upper Saddle River, NJ
Prentice-Hall, 1999.