Applying MESE processes to Improve Online E-Voting Prototype System with PTC Web Services Master Project Defense Hakan Evecek 1 5/29/2007Hakan Evecek/SE2Evote.

Slides:



Advertisements
Similar presentations
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Advertisements

A Pairing-Based Blind Signature
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Digital Signatures and Hash Functions. Digital Signatures.
Lect. 18: Cryptographic Protocols. 2 1.Cryptographic Protocols 2.Special Signatures 3.Secret Sharing and Threshold Cryptography 4.Zero-knowledge Proofs.
Electronic Voting Presented by Ben Riva Based on presentations and papers of: Schoenmakers, Benaloh, Fiat, Adida, Reynolds, Ryan and Chaum.
Observation of e-enabled elections Jonathan Stonestreet Council of Europe Workshop Oslo, March 2010.
1 The RSA Algorithm Supplementary Notes Prepared by Raymond Wong Presented by Raymond Wong.
1/11/2007 bswilson/eVote-PTCWS 1 Paillier Threshold Cryptography Web Service by Brett Wilson.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
Spring 2002CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Proactive Secure Mobile Digital Signatures Work in progress. Ivan Damgård and Gert Læssøe Mikkelsen University of Aarhus.
ECOMMERCE TECHNOLOGY FALL 2003 COPYRIGHT © 2003 MICHAEL I. SHAMOS Cryptography.
Cryptography1 CPSC 3730 Cryptography Chapter 10 Key Management.
10/25/20061 Threshold Paillier Encryption Web Service A Master’s Project Proposal by Brett Wilson.
The Algebra of Encryption CS 6910 Semester Research and Project University of Colorado at Colorado Springs By Cliff McCullough 20 July 2011.
Henric Johnson1 Chapter3 Public-Key Cryptography and Message Authentication Henric Johnson Blekinge Institute of Technology, Sweden
Paillier Threshold Encryption WebService by Brett Wilson.
Cryptographic teaching tools Presented by: Suan Khai Chong Supervisor: Assoc. Prof. Graham Farr Second Reader: Dianne Hagan.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Spring 2003CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Cryptography1 CPSC 3730 Cryptography Chapter 9 Public Key Cryptography and RSA.
1/11/2007 bswilson/eVote-PTCWS 1 Enhancing PTC based Secure E-Voting System (note: modification of Brett Wilson’s Paillier Threshold Cryptography Web Service.
Fall 2010/Lecture 311 CS 426 (Fall 2010) Public Key Encryption and Digital Signatures.
Public Key Cryptography RSA Diffie Hellman Key Management Based on slides by Dr. Lawrie Brown of the Australian Defence Force Academy, University College,
CSE 597E Fall 2001 PennState University1 Digital Signature Schemes Presented By: Munaiza Matin.
E- Business Digital Signature Varna Free University Prof. Teodora Bakardjieva.
ASYMMETRIC CIPHERS.
Computer Science Public Key Management Lecture 5.
Secure Systems Research Group - FAU Patterns for Digital Signature using hashing Presented by Keiko Hashizume.
An Architecture For Electronic Voting Master Thesis Presentation Clifford Allen McCullough Department of Computer Science University of Colorado at Colorado.
1 Fluency with Information Technology Lawrence Snyder Chapter 17 Privacy & Digital Security Encryption.
Information Security and Management 13. Digital Signatures and Authentication Protocols Chih-Hung Wang Fall
CS5204 – Fall Cryptographic Security Presenter: Hamid Al-Hamadi October 13, 2009.
1 Public-Key Cryptography and Message Authentication Ola Flygt Växjö University, Sweden
The RSA Algorithm Rocky K. C. Chang, March
1 Introduction to Security and Cryptology Enterprise Systems DT211 Denis Manley.
KYUSHUUNIVERSITYKYUSHUUNIVERSITY SAKURAILABORATORYSAKURAILABORATORY Sakurai Lab. Kyushu University Dr-course HER, Yong-Sork E-voting VS. E-auction.
RSA Implementation. What is Encryption ? Encryption is the transformation of data into a form that is as close to impossible as possible to read without.
RSA Ramki Thurimella.
10/1/2015 9:38:06 AM1AIIS. OUTLINE Introduction Goals In Cryptography Secrete Key Cryptography Public Key Cryptograpgy Digital Signatures 2 10/1/2015.
Optimistic Mixing for Exit-Polls Philippe Golle, Stanford Sheng Zhong, Yale Dan Boneh, Stanford Markus Jakobsson, RSA Labs Ari Juels, RSA Labs.
An Architecture For Electronic Voting Master Thesis Presentation Clifford Allen McCullough Department of Computer Science University of Colorado at Colorado.
Cryptography Dec 29. This Lecture In this last lecture for number theory, we will see probably the most important application of number theory in computer.
Cryptography, Authentication and Digital Signatures
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
4 th lecture.  Message to be encrypted: HELLO  Key: XMCKL H E L L O message 7 (H) 4 (E) 11 (L) 11 (L) 14 (O) message + 23 (X) 12 (M) 2 (C) 10 (K) 11.
By Yernar.  Background  Key generation  Encryption  Decryption  Preset Bits  Example.
Public-Key Encryption
Public Key Cryptography. symmetric key crypto requires sender, receiver know shared secret key Q: how to agree on key in first place (particularly if.
1 Public-Key Cryptography and Message Authentication.
Chapter 16 Security Introduction to CS 1 st Semester, 2012 Sanghyun Park.
Cryptography and Network Security Chapter 9 - Public-Key Cryptography
Applying MESE processes to Improve Online E-Voting Prototype System with PTC Web Services Master Project Defense Hakan Evecek 1 5/29/2007Hakan Evecek/SE2Evote.
PUBLIC-KEY CRYPTOGRAPH IT 352 : Lecture 2- part3 Najwa AlGhamdi, MSc – 2012 /1433.
Chapter 3 (B) – Key Management; Other Public Key Cryptosystems.
Advanced Database Course (ESED5204) Eng. Hanan Alyazji University of Palestine Software Engineering Department.
The Paillier Cryptosystem
1 Chapter 10: Key Management in Public key cryptosystems Fourth Edition by William Stallings Lecture slides by Lawrie Brown (Modified by Prof. M. Singhal,
Almost Entirely Correct Mixing With Applications to Voting Philippe Golle Dan Boneh Stanford University.
Lecture 11 Overview. Digital Signature Properties CS 450/650 Lecture 11: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
Lecture 9 Overview. Digital Signature Properties CS 450/650 Lecture 9: Digital Signatures 2 Unforgeable: Only the signer can produce his/her signature.
CSCE 715: Network Systems Security Chin-Tser Huang University of South Carolina.
1 The RSA Algorithm Rocky K. C. Chang February 23, 2007.
Security Outline Encryption Algorithms Authentication Protocols
Asymmetric-Key Cryptography
Efficient CRT-Based RSA Cryptosystems
eVoting System Proposal
Introduction to Cryptography
Presentation transcript:

Applying MESE processes to Improve Online E-Voting Prototype System with PTC Web Services Master Project Defense Hakan Evecek 1 5/29/2007Hakan Evecek/SE2Evote

Outline of the Talk Introduction Document overview prepared for this project. Related Work Paillier Threshold Cryptography (PTC) PTC Web Services Online E-Voting System Suggested Improvement ◦ Encryption/Decryption Optimization ◦ User Interface Future Directions Conclusion 2 5/29/2007Hakan Evecek/SE2Evote

Introduction The online E-Voting system generated within this project was based on an idea put forward in the ‘Future Suggestions’ section of the Master’s Thesis of Mr. Brett Wilson. ( As a result, augmentation of the demo application for PTC Web Services was undertaken. 5/29/2007Hakan Evecek/SE2Evote3

Continued… Scope of E-Voting: The world is heading in this direction as currently many nations and large companies are seeking E-Voting solutions. ◦ Similar to manual voting - only much faster and cheaper, however  Is the voter confident with the process?  Can Administrators monitoring verify that one vote is recorded for each voter?  How trustable is the tally process?  Is it socially acceptable? 4 5/29/2007Hakan Evecek/SE2Evote

E-Voting Requirements 5 Basic requirements for electronic voting Privacy – All votes should be kept secret Completeness – All valid votes should be counted correctly Soundness – Any invalid vote should not be counted Unreusability – No voter can vote twice Eligibility – Only authorized voters can cast a vote Fairness – Nothing can affect the voting 5/29/2007Hakan Evecek/SE2Evote

E-Voting Requirements 6 Extended Requirements for electronic voting Robustness – faulty behavior of any reasonably sized coalition of participants can be tolerated. In other words, the system must be able to tolerate to certain faulty conditions and must be able to manage these situations. Universal Verifiability – any party can verify the result of the voting Receipt-freeness – Voters are unable to prove the content of his/her vote Incoercibility – Voter cannot be coerced into casting a particular vote by a coercer. 5/29/2007Hakan Evecek/SE2Evote

The categorization of voting system 7 5/29/2007Hakan Evecek/SE2Evote

MESE Processes Applied for Online E- Voting System Project Proposal and Plan Software Requirements Document (SRS) Software Design Specification (SDS) Testing Document Defects List Project Report 8 5/29/2007Hakan Evecek/SE2Evote

Related Work Some of the Encryption Schemes ◦ Goldwasser-Micali Scheme (1984) It is probabilistic cryptography. Their scheme has the ability to encrypt the same text in many different ways without changing the modulus. It is very slow compared to the other schemes. ◦ Blum-Goldwasser Scheme (1985) This scheme is comparable in speed to another public key scheme, RSA. Unfortunately it is not as robust as RSA. ◦ The Paillier cryptosystem (1999)  a probabilistic asymmetric algorithm for public key cryptography. A given cleartext message can be encrypted into any one of a very large set of possible encryption values  homomorphic  deterministic 9 5/29/2007Hakan Evecek/SE2Evote

Continued… ◦ Uses of Paillier Cryptography  Electronic Voting  Anonymous Mix Nets (due to self-blinding property)  Electronic Auctions  Electronic Lotteries ◦ Damgard-Jurick Scheme (2000) Just a modification of Paillier's scheme. It is also called Generalized Paillier System. It allows a user to increase the size of the encrypted value. Like Paillier it is probabilistic and homomorphic. 10Hakan Evecek/SE2Evote5/29/2007

Continued… ◦ Homomorphic Encryption A special type of cryptography in which the sum of two encrypted values is equal to the encrypted sum of the values. ◦ Public Key Cryptography Asymmetric cryptography, is a form of cryptography in which each user will have a key that didn’t have to be kept secret. ◦ Threshold Cryptography A cryptographic function can be distributed amongst several participants in such a way that the operation can be performed only through cooperation of a specified subset of the participants. In addition, if less than the required number of participants’ attempts to perform the action, no useful information can be constructed or obtained.

Cryptographic Techniques Implemented by Brett Wilson to PTC Web Services Paillier CryptoSystem [15] ◦ Trapdoor Discrete Logarithm Scheme ◦ c = g M r n mod n 2  n is an RSA modulus (modulus of 2 safe primes)  Safe prime - p = 2q + 1 where q is also prime  g is an integer of order nα mod n 2  r is a random number in Z n * ◦ M = L(c λ(n) mod n 2 )/L(g λ(n) mod n 2 ) mod n ◦ L(u) = (u-1)/n, λ(n)=lcm((p-1)(q-1)) ◦ Important Properties  Probabilistic (randomness of E(M))  Homomorphic  E(M 1 + M 2 ) = E(M 1 ) x E(M 2 ), E(k x M) = E(M) k  Self-blinding  D(E(M) r n mod n 2 ) = m 12 5/29/2007Hakan Evecek/SE2Evote Continued…

Cryptographic Techniques Implemented Threshold Encryption [15] ◦ Public key encryption as usual ◦ Distribute secret key “shares” among i participants ◦ Decryption can only be accomplished if a threshold number t of the i participants cooperate  No information about m can be obtained with less than t participants cooperating Shamir Secret Sharing ◦ Lagrange Interpolation formula ◦ f(X) = Σti=0 aiXi ◦ a0 is secret, ai are random, f(X) are “secret shares”  X is share index (1 to number of servers) ◦ If enough f(X) available it is possible to recover a0 13 5/29/2007Hakan Evecek/SE2Evote

Operation of E-Voting System [15] 5. Paillier Public Key 6. Paillier Encrypted Vote 1.Election Authorities RSA Public Keys 8. Partial Decryption Shares of Vote Tally/Proofs of Correct Decryption 4. RSA Encrypted Secret Key Shares 7. Paillier Encrypted Vote Tally 2. SOAP/XML Request for PTC Parameters 3. SOAP/XML Response containing RSA encrypted PTC Parameters 14Hakan Evecek/SE2Evote5/29/2007

Hakan Evecek/SE2Evote 15

User Login Page Assumed that users has registered previously and has secure login credentials provided. Admin Users Voters Completely Automated Public Turing test to tell Computers and Humans Apart (CAPTCHA) 16 5/29/2007Hakan Evecek/SE2Evote

Admin Page Election Creation Ballot Creation Tally Vote Encryption/Decryption Generate Safe Prime Numbers 17 5/29/2007Hakan Evecek/SE2Evote

Election Form 18 Hakan Evecek/SE2Evote 5/29/2007

Continued… 19Hakan Evecek/SE2Evote5/29/2007

Ballots Form 20Hakan Evecek/SE2Evote 5/29/2007

Voter Page Voter can access to the elections and complete the voting process. Automatically loads the voting page. ◦ Allows vote, then doesn’t allow user to vote again 21 5/29/2007Hakan Evecek/SE2Evote

Database Schema 22 5/29/2007Hakan Evecek/SE2Evote

Suggested Key Generation, Encryption/Decryption Optimization Safe Prime Numbers Pre-Computation Process. Chinese Remainder Theorem to calculate p,q separately and then multiply for n. Paillier Scheme Pre-Computation for decryption. 5/29/2007 Hakan Evecek/SE2Evote 23

Results 128 bit Encryption 256 bit Encryption 5/29/2007 Hakan Evecek/SE2Evote 24

Lessons Learned The SE processes applied in this project has set precedence which can be used for the future projects. Ensure that the SRS, SDS and test documents can be easily modified and any future enhancements can be made with ease. Security issues involved in E-voting systems. CRT is a very useful theorem that can be applied on other theorems to improve the efficiency and increase the speed of the computations. Pre-computation is always an improvement to the systems as long as they are designed and architected properly like running a thread on the background to generate prime numbers in this case. Setting up read/write access permissions for the folders is important in ASP.Net. It is very important to follow the processes on this setup. Certificate registration and confirmation requires additional processes for the internet solutions. 5/29/2007Hakan Evecek/SE2Evote 25

Future Direction Implement the suggested CRT improvement into the code. Implement constant value pre-computation for decryption process. Fix XML solution in the code. Add more web application security protocols and processes. Implement registration and voter identity verification process. ◦ Authenticity of election parameters/ballots not currently guaranteed  Implement signing of election parameters/ballots by admin 26 5/29/2007Hakan Evecek/SE2Evote

Conclusion Encryption parameters creation process improvements with the application of pre-computation to the web services. Alternate processes are also available to improve the efficiency further, such as: CRT Theorem, applying pre- computation to other constants in the Paillier’s scheme and also using 3 rd scheme instead of the 1 st scheme as explained in many researches. The online E-Voting system with Paillier Cryptosystem Web Services implemented in this project brings a more secure e- voting environment one step closer. Online E-Voting systems need to be considered as an enterprise solution when security, from the registration till the end of the Tally process, is to be considered. 5/29/2007Hakan Evecek/SE2Evote 27

References [1] [1] Implementation issues in a secure e-voting schemes, Riza Aditya, Byoungcheon Lee, Colin Boyd and Ed Dawson. Implementation issues in a secure e-voting schemes, Riza Aditya, Byoungcheon Lee, Colin Boyd and Ed Dawson. [3] [3] Vote Early, Vote Often, and VoteHere: A Security Analysis of VoteHere, Philip E. Varner, May 11, Vote Early, Vote Often, and VoteHere: A Security Analysis of VoteHere, Philip E. Varner, May 11, [5] P. Fouque, G. Poupard, J.Stern, Sharing Decryption in the Context of Voting or Lotteries, Financial Cryptography 2000 Proceedings. [5] P. Fouque, G. Poupard, J.Stern, Sharing Decryption in the Context of Voting or Lotteries, Financial Cryptography 2000 Proceedings. [6] the Official CAPTCHA web site. [6] the Official CAPTCHA web site. [7] R. Michael Alvarez, Jonathan Nagler, The Likely consequences of Internet Voting for Political Representations. [7] R. Michael Alvarez, Jonathan Nagler, The Likely consequences of Internet Voting for Political Representations. [15] B. Wilson, C. E. Chow, Paillier Threshold Cryptography Web Service User’s Guide, University of Colorado – Colorado Springs Master’s Project, [15] B. Wilson, C. E. Chow, Paillier Threshold Cryptography Web Service User’s Guide, University of Colorado – Colorado Springs Master’s Project, [16] Progress on Probabilistic Encryption Schemes, Kert Richardson, July [16] Progress on Probabilistic Encryption Schemes, Kert Richardson, July [17] An Analysis of Chaum’s voter-verifiable election scheme, Julie Ann Staub, 2005 [17] An Analysis of Chaum’s voter-verifiable election scheme, Julie Ann Staub, 2005http:// [18] Ivan Damgard and Mads J. Jurik, A Generalization, a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System, PKC [18] Ivan Damgard and Mads J. Jurik, A Generalization, a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System, PKC [ [20] CryptoBytes, Dan Boneh, Hovav Shacham, Spring [ [20] CryptoBytes, Dan Boneh, Hovav Shacham, Spring [21] Public-Key CryptoSystems Based on Composite Degree Residuosity Classes, Pascal Paillier, 1999 [21] Public-Key CryptoSystems Based on Composite Degree Residuosity Classes, Pascal Paillier, 1999http:// [22] Paillier Crytosystem from Wikipedia, the free encyclopedia. [22] Paillier Crytosystem from Wikipedia, the free encyclopedia /29/2007Hakan Evecek/SE2Evote