CSI-4138/CEG-4394 Design of Secure Computer Systems Virtual Election Booth Lab Project Jean-Yves Chouinard Fall 2002.

Slides:



Advertisements
Similar presentations
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
Advertisements

Presentation Name Elements and Standards
IT 221: Introduction to Information Security Principles Lecture 1: Introduction to IT Security For Educational Purposes Only Revised: August 28, 2002.
Introduction to System Analysis and Design
Project Integration Management Sections of this presentation were adapted from A Guide to the Project Management Body of Knowledge 4 th Edition, Project.
Dr Alejandra Flores-Mosri Message Authentication Internet Management & Security 06 Learning outcomes At the end of this session, you should be able to:
GRADUATING PROJECT ORIENTATION BY Professor Muhammad Arshad Malik
Distributed Systems1 Lecture 12: RSA Distributed Systems2 Plan for today: Introduce RSA and a toy example using small numbers. This is.
Key dates lists of suggested projects published * *If you or your partner are working in a biology lab, try to find a relevant project which can.
Projects Key dates lists of suggested projects published * *You are highly encouraged to choose a project yourself or find a relevant project.
Secret Voting What makes a secret vote secret?. Voting Goals Need to record who voted only eligible voters can vote, nobody votes twice Need to record.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 Computer Networks and Internets with Internet Applications, 4e By Douglas.
Some distinctions… Team Exercises 1 & 2 COBAE Options Presentations Ethics Cases LDC Core Cases Coaching Sessions Presentation Day.
Guidelines for Technical Reports The written report should present the complete design project investigation and should have the following format: –Cover.
Introduction to Hospitality, Fourth Edition John Walker ©2006 Pearson Education, Inc. Pearson Prentice Hall Upper Saddle River, NJ Chapter 18 Hospitality.
Report Writing Format.
Programming Satan’s Computer
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
Gerson & Gerson: Technical Writing, 5th Edition© 2006 Pearson Education, Upper Saddle River, NJ All Rights Reserved. 1 Chapter 17: Proposals This.
C HU H AI C OLLEGE O F H IGHER E DUCATION D EPARTMENT O F C OMPUTER S CIENCE Preparation of Final Year Project Report Bachelor of Science in Computer Science.
Public Health Reporting Functional Requirements Check-In May 23, 2012.
Masked Ballot Voting for Receipt-Free Online Elections Sam Heinith, David Humphrey, and Maggie Watkins.
© 2007 Pearson Education Inc., Upper Saddle River, NJ. All rights reserved.1 ITGN 235: Principles of Networking ITGN 225: Networking.
Symmetric versus Asymmetric Cryptography. Why is it worth presenting cryptography? Top concern in security Fundamental knowledge in computer security.
Protecting Internet Communications: Encryption  Encryption: Process of transforming plain text or data into cipher text that cannot be read by anyone.
Doing Case Instruction1 Case Instructions BUS 302 / FALL 2010.
6. Esoteric Protocols secure elections and multi-party computation Kim Hyoung-Shick.
Lecture 3 Feistel based algorithms. Today 1.Block ciphers - basis 2.Feistel cipher 3.DES 4.DES variations 5.IDEA 5.NEWDES.
Chapter 6:Esoteric Protocols Dulal C Kar. Secure Elections Ideal voting protocol has at least following six properties 1.Only authorized voters can vote.
1 Devising Longer Reports and Proposals Quarterly & annual reports/long range planning programs/systems evaluations/ grant requests/proposals Make strong.
1 BBA Project Report Writing Report Presentation (to p2) (to p7)
ICHPER  SD Journal of Research Writers’ Workshop Steven C. Wright, Ed.D. Kinesiology Pedagogy Coordinator University of New Hampshire, Durham, NH
Folie 1 Analysis of SM-Exchange Protocol using SM&C MAL DLR/GSOC Author: S.Gully.
Random Number Generation Using Quantum Physics. Introduction to randomness and random numbers PRNG-s TRNG-s Comparison between PRNG-s and TRNG-s.
CPS ® and CAP ® Examination Review OFFICE SYTEMS AND TECHNOLOGY, Fifth Edition By Schroeder and Graf ©2005 Pearson Education, Inc. Pearson Prentice Hall.
Idaho Procedures M100 OPTICAL SCAN PRECINCT TABULATOR.
Why Cryptography is Harder Than It Looks
Electronic Voting R. Newman. Topics Defining anonymity Need for anonymity Defining privacy Threats to anonymity and privacy Mechanisms to provide anonymity.
Computer Network Design 9-th Semester Structrure and Requirements STRUCTURE –2 h course/week –2 h practical work/week –1 h design/week REQUIREMENTS.
TITLE OF AUDIT Author Date of presentation. Background  Why did you do the audit? eg. high risk / high cost / frequent procedure? Concern that best practice.
Format of Formal Reports
C HU H AI C OLLEGE O F H IGHER E DUCATION D EPARTMENT O F C OMPUTER S CIENCE Preparation of Final Year Project Report Bachelor of Science in Computer Science.
Networking with LabVIEW. Introduction To put it in simple terms, networking focuses on how to make computers “talk” to each other.
Chapter 17 Writing the Research Report. Public Disclosure of Results Culmination of the research process Options for disclosure –Journal article –Thesis.
Kigali Independent University
 Key Management  Secure Group Management  Authorization Management  Latest Relevant Knowledge  Future Work  References 2.
IT 221: Introduction to Information Security Principles Lecture 5: Message Authentications, Hash Functions and Hash/Mac Algorithms For Educational Purposes.
Technical Report Outline Title Page Frontispiece Abstract Table of Contents List of Figures/ List of Tables.
Chapter 11 Data Input and Output. Input Data Capture Forms Data can be collected using a data capture form or questionnaire that is printed on a piece.
1. 1.To examine the information included in business reports. 2.To understand how to organize documents in order to ensure clear communication. 3.To analyze.
SOA Seminar1 Seminar on Service Oriented Architecture RSA.
SYSTEM ANALYSIS AND DESIGN LAB NARZU TARANNUM(NAT)
GE 306Dr SaMeH1 Engineering Report Writing (GE 306) Associate Professor of Environmental Eng. Civil Engineering Department Engineering College Almajma’ah.
SSCP: A High-Speed Introduction to the Exam Domains
CS580 Internet Security Protocols
Final Presentation of (Field Study or OCI) Project named …
e-Health Platform End 2 End encryption
Forecasting Project Format
Abstract The systems get affected due to worms and viruses. If worm enters the system it immediately starts affecting the system activities. Also the system.
Data Analysis & Report Writing
How To Create Cox New Account?
Figure 16.1 Target model of an OS
Fun gym Cambridge Nationals R001.
Introduction to Lower Division Core (LDC) Cases
eVoting System Proposal
Final Year PROJECT REPORT FORMAT
Final Report Outline Title Page Letter of Transmittal
Project Integration Management
Project Integration Management
Chapter 8 Writing Formal Reports, Business Plans, and White Papers
Presentation transcript:

CSI-4138/CEG-4394 Design of Secure Computer Systems Virtual Election Booth Lab Project Jean-Yves Chouinard Fall 2002

CSI-4138/CEG4394 Design of Secure Computer Systems (J.-Y. Chouinard, Fall 2002) Secure Election Protocol  Implementation of a secure election protocol  Use of two central facilities:  CTF: Central Tabulating Facility  CLA: Central Legitimization Agency  Design objectives:  secure protocol for voters to vote online  ensuring individual privacy  No possibility of cheating the election

CSI-4138/CEG4394 Design of Secure Computer Systems (J.-Y. Chouinard, Fall 2002) Secure Election Protocol Requirements  Only authorized voters can vote  Authorized voters can vote only once  All voters can verify that their vote has been taken into account and tabulated  No one can determine for whom anyone voted  No one can change anyone else’s vote  Everyone knows who voted and who didn’t

CSI-4138/CEG4394 Design of Secure Computer Systems (J.-Y. Chouinard, Fall 2002) Central Tabulating Facility and Central Legitimization Agency  The CLA certifies the voters:  Each voter sends a message to the CLA requesting a validation number.  The CLA returns a random validation number and maintains a list of validation numbers and the corresponding recipients.  The CLA sends the list of validation numbers to the CTF.

CSI-4138/CEG4394 Design of Secure Computer Systems (J.-Y. Chouinard, Fall 2002) Central Tabulating Facility and Central Legitimization Agency  The CTF counts the votes:  The voters sends their vote to the CTF.  The CTF checks the voters validation numbers against the list received from the CLA: if the validation number is valid then the vote is counted and the validation number disabled (to prevent multiple votes from the same voter).  After all the votes are entered, the CTF publish the election results.

CSI-4138/CEG4394 Design of Secure Computer Systems (J.-Y. Chouinard, Fall 2002) Term Project Report  Teams of three students  Any team member should be able to present the report and answer all questions  Detailed page written technical report  Neat, readable and self-contained  No raw computer outputs; include only relevant program exerpts (reduced properly in size)  Include all relevant references, figures tables, diagrams, etc.

CSI-4138/CEG4394 Design of Secure Computer Systems (J.-Y. Chouinard, Fall 2002) Term Project Report Format  Summary (1 page): motivation, literature review, methodology used, results and general conclusion  Introduction: backgraound material, scope and limitations of the term project (secure election protocol)  Literature review, methodology: main body of the term project report  Results: description of the results (exlain all tables, figures, flow charts, block diagrams, listings, etc.  Conclusion: general conclusion, limitations, recommendations for future implementations  References: include the references used and relevant to this project: all entries must be completed  Appendices: as needed support the main body of the report

CSI-4138/CEG4394 Design of Secure Computer Systems (J.-Y. Chouinard, Fall 2002) References [SCHN96]Applied Cryptography: Protocols, Algorithms, and Source Code in C (2nd edition), Bruce Schneier, John Wiley and Sons, New-York, [SALO96]Public-Key Cryptography, Arto Salomaa, Springer Verlag, New-York, [STAL99]Cryptography and Network Security: Principles and Practice, William Stallings (2nd edition), Appendix A, Upper Saddle River, NJ: Prentice- Hall, 1999.