Csi 4138 ceg 4394 design of secure computer systems
This presentation is the property of its rightful owner.
Sponsored Links
1 / 8

CSI-4138/CEG-4394 Design of Secure Computer Systems PowerPoint PPT Presentation


  • 172 Views
  • Uploaded on
  • Presentation posted in: General

CSI-4138/CEG-4394 Design of Secure Computer Systems. Virtual Election Booth Lab Project Jean-Yves Chouinard Fall 2002. Secure Election Protocol. Implementation of a secure election protocol Use of two central facilities: CTF: Central Tabulating Facility CLA: Central Legitimization Agency

Download Presentation

CSI-4138/CEG-4394 Design of Secure Computer Systems

An Image/Link below is provided (as is) to download presentation

Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author.While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server.


- - - - - - - - - - - - - - - - - - - - - - - - - - E N D - - - - - - - - - - - - - - - - - - - - - - - - - -

Presentation Transcript


Csi 4138 ceg 4394 design of secure computer systems

CSI-4138/CEG-4394 Design of Secure Computer Systems

Virtual Election Booth

Lab Project

Jean-Yves Chouinard Fall 2002


Secure election protocol

Secure Election Protocol

  • Implementation of a secure election protocol

  • Use of two central facilities:

    • CTF: Central Tabulating Facility

    • CLA: Central Legitimization Agency

  • Design objectives:

    • secure protocol for voters to vote online

    • ensuring individual privacy

    • No possibility of cheating the election


Secure election protocol requirements

Secure Election Protocol Requirements

  • Only authorized voters can vote

  • Authorized voters can vote only once

  • All voters can verify that their vote has been taken into account and tabulated

  • No one can determine for whom anyone voted

  • No one can change anyone else’s vote

  • Everyone knows who voted and who didn’t


Central tabulating facility and central legitimization agency

Central Tabulating Facility and Central Legitimization Agency

  • The CLA certifies the voters:

    • Each voter sends a message to the CLA requesting a validation number.

    • The CLA returns a random validation number and maintains a list of validation numbers and the corresponding recipients.

    • The CLA sends the list of validation numbers to the CTF.


Central tabulating facility and central legitimization agency1

Central Tabulating Facility and Central Legitimization Agency

  • The CTF counts the votes:

    • The voters sends their vote to the CTF.

    • The CTF checks the voters validation numbers against the list received from the CLA: if the validation number is valid then the vote is counted and the validation number disabled(to prevent multiple votes from the same voter).

    • After all the votes are entered, the CTF publish the election results.


Term project report

Term Project Report

  • Teams of three students

  • Any team member should be able to present the report and answer all questions

  • Detailed 15-25 page written technical report

  • Neat, readable and self-contained

  • No raw computer outputs; include only relevant program exerpts (reduced properly in size)

  • Include all relevant references, figures tables, diagrams, etc.


Term project report format

Term Project Report Format

  • Summary (1 page): motivation, literature review, methodology used, results and general conclusion

  • Introduction: backgraound material, scope and limitations of the term project (secure election protocol)

  • Literature review, methodology: main body of the term project report

  • Results: description of the results (exlain all tables, figures, flow charts, block diagrams, listings, etc.

  • Conclusion: general conclusion, limitations, recommendations for future implementations

  • References: include the references used and relevant to this project: all entries must be completed

  • Appendices: as needed support the main body of the report


References

References

[SCHN96]Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd edition), Bruce Schneier, John Wiley and Sons, New-York, 1996.

[SALO96]Public-Key Cryptography, Arto Salomaa, Springer Verlag, New-York, 1996.

[STAL99]Cryptography and Network Security: Principles and Practice, William Stallings (2nd edition), Appendix A, Upper Saddle River, NJ: Prentice-Hall, 1999.


  • Login