CSI4138CEG4394 Design of Secure Computer Systems - PowerPoint PPT Presentation

About This Presentation
Title:

CSI4138CEG4394 Design of Secure Computer Systems

Description:

No possibility of cheating the election ... Secure Election Protocol Requirements ... After all the votes are entered, the CTF publish the election results. ... – PowerPoint PPT presentation

Number of Views:44
Avg rating:3.0/5.0
Slides: 9
Provided by: siteUo
Category:

less

Transcript and Presenter's Notes

Title: CSI4138CEG4394 Design of Secure Computer Systems


1
CSI-4138/CEG-4394 Design of Secure Computer
Systems
  • Virtual Election Booth
  • Lab Project
  • Jean-Yves Chouinard Fall 2002

2
Secure Election Protocol
  • Implementation of a secure election protocol
  • Use of two central facilities
  • CTF Central Tabulating Facility
  • CLA Central Legitimization Agency
  • Design objectives
  • secure protocol for voters to vote online
  • ensuring individual privacy
  • No possibility of cheating the election

3
Secure Election Protocol Requirements
  • Only authorized voters can vote
  • Authorized voters can vote only once
  • All voters can verify that their vote has been
    taken into account and tabulated
  • No one can determine for whom anyone voted
  • No one can change anyone elses vote
  • Everyone knows who voted and who didnt

4
Central Tabulating Facility and Central
Legitimization Agency
  • The CLA certifies the voters
  • Each voter sends a message to the CLA requesting
    a validation number.
  • The CLA returns a random validation number and
    maintains a list of validation numbers and the
    corresponding recipients.
  • The CLA sends the list of validation numbers to
    the CTF.

5
Central Tabulating Facility and Central
Legitimization Agency
  • The CTF counts the votes
  • The voters sends their vote to the CTF.
  • The CTF checks the voters validation numbers
    against the list received from the CLA if the
    validation number is valid then the vote is
    counted and the validation number disabled (to
    prevent multiple votes from the same voter).
  • After all the votes are entered, the CTF publish
    the election results.

6
Term Project Report
  • Teams of three students
  • Any team member should be able to present the
    report and answer all questions
  • Detailed 15-25 page written technical report
  • Neat, readable and self-contained
  • No raw computer outputs include only relevant
    program exerpts (reduced properly in size)
  • Include all relevant references, figures tables,
    diagrams, etc.

7
Term Project Report Format
  • Summary (1 page) motivation, literature review,
    methodology used, results and general conclusion
  • Introduction backgraound material, scope and
    limitations of the term project (secure election
    protocol)
  • Literature review, methodology main body of the
    term project report
  • Results description of the results (exlain all
    tables, figures, flow charts, block diagrams,
    listings, etc.
  • Conclusion general conclusion, limitations,
    recommendations for future implementations
  • References include the references used and
    relevant to this project all entries must be
    completed
  • Appendices as needed support the main body of
    the report

8
References
SCHN96 Applied Cryptography Protocols,
Algorithms, and Source Code in C (2nd edition),
Bruce Schneier, John Wiley and Sons, New-York,
1996. SALO96 Public-Key Cryptography, Arto
Salomaa, Springer Verlag, New-York,
1996. STAL99 Cryptography and Network Security
Principles and Practice, William Stallings (2nd
edition), Appendix A, Upper Saddle River, NJ
Prentice-Hall, 1999.
Write a Comment
User Comments (0)
About PowerShow.com