E-Voting Application using Internal Vtoken Bowo Prasetyo Isolated e-Voting System in a Precinct Secured with Vote Sealing and Paper Audit Trail December.

Slides:



Advertisements
Similar presentations
Internet Voting in Estonia Tarvi Martens Project Manager National Electoral Committee.
Advertisements

Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
The Italian Academic Community’s Electronic Voting System Pierluigi Bonetti Lisbon, May 2000.
ETen E-Poll ID – Strasbourg COE meeting November, 2006 Slide 1 E-TEN E-POLL Project Electronic Polling System for Remote Operation Strasbourg.
ICT IN THE ELECTORAL PROCESS: LESSONS LEARNED Susanne Caarls International Electoral Affairs Symposium May 2012.
1 Supplement III: Security Controls What security services should network systems provide? Confidentiality Access Control Integrity Non-repudiation Authentication.
Observation of e-enabled elections Jonathan Stonestreet Council of Europe Workshop Oslo, March 2010.
DESIGNING A PUBLIC KEY INFRASTRUCTURE
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
E-Voting Machine - Design Presentation Group M1 Jessica Kim Chi Ho Yoon Jonathan Chiang Donald Cober Mon. Sept 8 Initial Design Secure Electronic Voting.
Long-term Archive Service Requirements draft-ietf-ltans-reqs-00.txt.
TrustPort Public Key Infrastructure. Keep It Secure Table of contents  Security of electronic communications  Using asymmetric cryptography.
Guide to the Voting Action Planner Voting is the way we elect government officials, pass laws and decide on issues…
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
Digital Signature Xiaoyan Guo/ Xiaohang Luo/
Digital Certificate Installation & User Guide For Class - 2 Certificates.
Digital Cash By Gaurav Shetty. Agenda Introduction. Introduction. Working. Working. Desired Properties. Desired Properties. Protocols for Digital Cash.
An Internet Voting System Manager Yonghua Li Kansas State University October 19, 2001 MSE Project - Phase I.
Tutorial Chapter 5. 2 Question 1: What are some information technology tools that can affect privacy? How are these tools used to commit computer crimes?
TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012.
Certificate-Based Operations. Module Objectives By the end of this module participants will be able to: Define how cryptography is used to secure information.
SEMINAR TOPIC ON GLOBAL WIRELESS E-VOTING
Types of Electronic Infection
UK LEADS THE ADOPTION OF E-VOTING STANDARDS John Borras Chair Election & Voter Services Technical Committee
Strasbourg – How to create trust-1 © G. Skagestein November 2006 How to create trust in electronic voting over an untrusted platform A possible solution.
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
Privacy versus Authentication Confidentiality (Privacy) –Interceptors cannot read messages Authentication: proving the sender’s identity –The Problem of.
Digital Signatures, Message Digest and Authentication Week-9.
DIGITAL SIGNATURE.
Security & Privacy. Learning Objectives Explain the importance of varying the access allowed to database elements at different times and for different.
The world leader in serving science Overview of Thermo 21 CFR Part 11 tools Overview of software used by multiple business units within the Spectroscopy.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
The Estonian eID - concept and applications Signe Ratso Deputy Secretary General Gothenburg, November 14, 2005.
© Copyright 2009 SSLPost 01. © Copyright 2009 SSLPost 02 a recipient is sent an encrypted that contains data specific to that recipient the data.
Secure Remote Electronic Voting CSE-681 Fall 2006 David Foster and Laura Stapleton Laura StapletonLaura Stapleton.
Evaluation of an E-Voting Device based on a Common Criteria Protection Profile Roland Vogt, DFKI GmbH Dr. Sönke Maseberg, datenschutz nord GmbH 8th ICCC,
1 WE VISUALISED A WORLD’S FIRST, WE DELIVERED IT Proven solutions for multi-channel elections.
EA Tablet ® Poll Worker Training Setup and Use of the EA Tablet ® Ohio Version – Fourth Edition © 2014 Election Administrators, LLC C ONFIDENTIAL N OTICE.
Secure, verifiable online voting 29 th June 2016.
Guided by : VIPUL GAJJAR Prepared by: JIGAR KAKADIYA.
222 About RPost Leader in security since 2000 Endorsed by more than 20 major bar/law associations Used by U.S. Government Used by insurance carriers.
Vtoken Generator Application Bowo Prasetyo. Vtoken Generator Application ● Vtoken Generator application (VG) is an application in vtoken generating machine.
 Introduction  History  What is Digital Signature  Why Digital Signature  Basic Requirements  How the Technology Works  Approaches.
CHAP 6 – COMPUTER FORENSIC ANALYSIS. 2 Objectives Of Analysis Process During Investigation: The purpose of this process is to discover and recover evidences.
The Secure Sockets Layer (SSL) Protocol
Information Communication Technology use in Mongolian Elections
EVoting 23 October 2006.
E-voting …and why it’s good..
e-Health Platform End 2 End encryption
Canvassing, Reporting and Preserving Results
Electronic voting – safe or not?
Texas Secretary of State Elections Division
HB4034 – Duplicate Batch Process
Accu-Vote Tabulator Preparation
Texas Secretary of State Elections Division
Canvassing, Reporting and Preserving Results
Network Security – Kerberos
County HIPAA Review All Rights Reserved 2002.
eVoting System Proposal
Lecture 4 - Cryptography
The Secure Sockets Layer (SSL) Protocol
Dawn Williams, State Director of Elections January 21, 2018
Internet Rechartering
Process flow Kindly note: This presentation is automated – please do not click any of your mouse buttons or keyboard keys.
The Italian Academic Community’s Electronic Voting System
Bharat Electronics
Bharat Electronics
Instructor Materials Chapter 5: Ensuring Integrity
ELECTRONIC SIGNATURES
ELECTRONIC SIGNATURES
Presentation transcript:

e-Voting Application using Internal Vtoken Bowo Prasetyo Isolated e-Voting System in a Precinct Secured with Vote Sealing and Paper Audit Trail December 10,

e-Voting Application ● e-Voting Application is an open source project aiming to create an e-voting system which complies to European e-Voting standard and EML specification. ● e-Voting Application is also used as basis to create an e-voting system which complies to Indonesian e-Voting standard which is being defined by Badan Pengkajian dan Penerapan Teknologi (BPPT).

Download and License ● e-Voting Application can be found here: – ● It is under the license GPL v3, basically means: – You may download, modify, use and redistribute it freely. – Derived works should be made open source too under the same license.

e-Voting Application Components ● Client side applications: – Vtoken Generating application (VG). – e-Voting Machine application (EVM). √ – Vote Counting application (VC). ● Server side systems: – e-Voting Tabulation system (EVT).

e-Voting Scenario ● Voting opening – Administrator opens voting process. ● Voting session – Administrator verifies voter. – Voters generate vtoken and cast vote using EVM. ● Voting closing – Administrator closes voting process. – EVM generates result in files. ● Result delivery – Administrator sends result to election body.

Voting Opening EV M Administrator opens voting in all EVM machines

Voting Opening ● Administrator opens voting process on the machine by pressing an open voting button on EVM. ● When opening voting process, EVM: – Activates and deactivates some functions. – Generates a pair of private key – public key for digital signature: ● EVM: private.bin and public.bin

Voting Opening ● Before administrator open voting process on the machine, EVM: – cannot be used to cast votes. – can be used to view result. – can be used to reset ballot box. ● After administrator open voting process, EVM: – can be used to cast votes. – cannot be used to view result. – cannot be used to reset ballot box.

Voting Session 1. Administrator verifies voter 3. Voter casts vote 5. Voter puts paper audit trail into audit box 4. Voter takes paper audit trail 2. Operator opens voting session

Voting Session ● Voter verification – Administrator verifies voter identity. ● Voting session opening – Operator open voting session for each voter as proof of right-to-vote. ● Vtoken generation – EVM generates vtoken internally before voting. ● Voting – Voter casts vote using EVM.

Voting Session ● Vote sealing – EVM seals “vtoken + vote” using digital signature. ● Vote collection – EVM collects sealed votes in ballot box electronic. ● Paper audit trail generation – Voter takes generated paper audit trail and puts into audit box.

Voter Verification ● Before voter casts a vote, administrator verifies for two things: – voter's identity, and – whether voter is eligible to vote. ● Administrator performs voter verification: – manually using traditional identity card, or – electronically using digital identity card, or – combination of both.

Voting Session Opening ● Voting session opening is a proof of right-to- vote for voter. ● It is done by EVM operator after visually confirmed voter verification by administrator. ● Operator uses remote keyboard connected to EVM with extended cable, to input “short” password to open voting session. – Long password is used by administrator to open administration page.

Vtoken Generation ● Before voter casts vote, EVM generates vtoken internally for each voter. ● Vtoken is randomly generated. ● Vtoken is unique for each voter. ● Vtoken cannot be associated with voter.

Voting ● Voter uses EVM to cast a vote by: – Choose a candidate with a touch. – Confirm the choice with a touch. – Take paper audit trail and put it in audit box.

Vote Sealing ● Each vote casted by voters is combined by their unique vtoken and sealed. ● By sealing it means: – Encrypts “vtoken + vote”. ● Makes it hard-to-read by bad guys. – Digitally signs the encrypted “vtoken + vote”. ● Makes it cannot be altered (integrity). ● Makes it cannot be denied as coming from the machine (non-repudiation).

Vote Collection ● Each sealed vote (encrypted and digitally signed) is collected into electronic ballot box. – Technically speaking, they are collected in a table in MySQL database. ● Sealed votes are collected in random order such that it cannot be traced down to the voter. – After each vote the table storage is physically reordered according to some random number.

Paper Audit Trail Generation ● EVM prints paper audit trail as soon as collected e-vote into electronic ballot box. ● Paper audit trail is a visual proof for voter that his/her choice is correctly accepted. – Hence paper audit trail should clearly print the voter's choice in human readable format. ● Paper audit trail is also counted as comparison to e-vote in the case of dispute. – Hence paper audit trail may also print additional machine readable barcode.

Voting Closing EV M Administrator closes voting in all EVM machines

Voting Closing ● Administrator closes voting process on the machine by pressing a close voting button on EVM. ● When closing voting process, EVM: – Activates and deactivates buttons. – Generates a result file: ● result.bin containing voting result.

Voting Closing ● Before administrator close voting process on the machine, EVM: – can be used to cast votes. – cannot be used to view result. – cannot be used to reset ballot box. ● After administrator close voting process, EVM: – cannot be used to cast votes. – can be used to view result. – can be used to reset ballot box.

Result Management ● Administrator sends voting results from each machine to election body. ● Each EVM machine generates voting result: – #-*-result.bin : a binary file containing all sealed votes casted by voters on the machine. – #-*-public.bin : a binary file containing key to verify and decrypt the sealed votes. ● Each EVM also generates audit result: – #-*-audit.log

Voting Result Management ● Files result.bin contains sealed votes which are encrypted and digitally signed. ● To verify and decrypt this sealed votes, the suitable public key is needed. ● Therefore each #-*-result.bin should always be accompanied by corresponding #-*- public.bin.

Audit Result Management ● Paper audit trails are physically collected and could be counted in case of dispute. ● Files #-*-audit.log contains record of all actions taken by user along with its timestamp. ● These are digitally signed by EVM, and could be verified using corresponding #-*-public.bin. ● These could be used to reconstruct all actions happened during evoting process for audit purpose. ● Since all sensitive information related to vote confidentiality is not recorded, these cannot be used to trace down voters and their choice.

Key Management ● Each EVM generated a pair of key: – #-*-private.bin – #-*-public.bin #: precinct no. *: room no.

Private Key Management ● Private key is used to digitally sign vtoken as well as sealed vote. ● After voting process finished, private key from all machines should be: – copied to external media, – deleted from each machine, and – guarded securely from being misused. ● Misuse of private key for example could generate forged votes as being genuine.

Public Key Management ● Public key is used to verify digital sign of vtoken and sealed vote. ● Public key is also used to decrypt sealed vote. ● After voting process finished, public key from all machines should be: – copied to external media together with corresponding result.bin – deleted from each machine, and – guarded securely from being misused. ● Misuse of public key for example to decrypt sealed vote by unauthorized person.

References ● “LEGAL, OPERATIONAL AND TECHNICAL STANDARDS FOR E- VOTING”, Recommendation Rec(2004)11 adopted by the Committee of Ministers of the Council of Europe on 30 September 2004 and explanatory memorandum.