This website uses cookies to ensure you have the best experience. Learn more

Secure Voting Protocol Design Essay

2670 words - 11 pages

AssumptionsCentral voting server and counter server have a physically secured tamper-proof hardware. So, a potential hacker has no way of physically destroying or altering the hardware of the server.Terminal is tamper-proof in the sense that there is no way to open up the terminal or modify its innards without irrevocably breaking the terminal.Each terminal has an accurate, tamper-proof clock inside it. This is to allow the voting during the specified time-periodEach voter has been provided with an ID (which is a string of 256 bits printed on a laminated card with the voter's photograph and signature) which use to verify themselves during votingCamera at top of terminal is tamper-proof to make sure it always in good conditionThe cryptographic systems used are hard to break to make sure hackers can't do any bad things to the voting process.Voter, central voting server and counter server do not collude with each other to make sure they didn't transfer their information secretlyThreatsIt is possible that hackers hack the computer system of central voting server, counter server or terminal to cause the process of voting forced to suspend until system administrator recover the system. Besides, it is also possible that someone send virus to the program. So, security is very important here to make sure voting process work as normal.Attacker can send a lot of request to the central voting server and counter server. This will make the communication channel congested and the voting process will run very slow and cause many voters can't finish their vote by deadline.It is possible that interception will occur. Attackers will get the IP addresses of terminals and hack the system of terminals. This will cause technicians keep going to different terminals and recover the system. This again will slow down the voting process.Modification may be will happen on lousy electronic voting protocol. Attackers can modify votes and let the votes to choose candidate who had bribe the attackers. Besides, attackers can duplicate votes and also make the new votes many times as they like. This will affect the fairness of the voting.Protocol Description & Design DecisionsFirst of all, the user ID that is a string of 256 bits is printed on a laminated card with the voters' photography and signature. This is not secure because many peoples can get the voters' user ID during the way the laminated card pass to voters' hand. Besides, voters' passwords were sent to them by the other way. This is same like when we apply master card, the bank send the card and password to us separately. This is to make sure the people who get voters' laminated card or their password can't do anything unless he/she get both the things. But even a criminal get both laminated card and password of a voter, the voter will report that he/she didn't receive both the two things and he/she will be given a new laminated card and a new password. So, it is secure enough.At the day of voting, when the voters...

Find Another Essay On Secure Voting Protocol Design

Networking: Network Security Essay

2472 words - 10 pages defined as ‘A sequence of operations that ensure the protection of data. Used with a communication protocol, it provides secure delivery of data between two parties’ (security protocol Definition from PC Magazine Encyclopedia. 2014). Cryptography is a key part of security protocols as it converts the data being sent into a secret code so it is fit for transmission in a secure manner, especially when being sent over a network that is public

The Voting Rights Act of 1965

2458 words - 10 pages it changed the way the government was run to satiate the citizens. With the help of Alice Paul, Lucy Burns, and others, organizations was created to resolved and use the voting power of the enfranchised women to force a suffrage resolution through Congress and secure ratification from the state legislatures; and in 1920 the Nineteenth Amendment to the Constitution granted nation-wide suffrage to women.Voting Rights Act's Effects on MinoritiesThe

Wireless Mobile Ad Hoc Mobile Networks Help Security

1502 words - 7 pages Energy awareness for computation and protocol management is becoming a crucial factor in the design of MANET protocols and algorithms. Because of mobility, we need the support of scalable routing strategies and these protocols try to consider the path duration in order to respect some QoS constraints and to reduce fake neighbor position for route discovery. Often energy saving and path duration and stability can be two contrasting efforts and

File Transfer Protocol: A White Paper

1336 words - 5 pages , is one way of subverting this security flaw. Another method would be to use SFTP (Secure FTP), which is a separate protocol than FTP, but behaves much in the same way, only with the added security (Leiden 2009). Works Cited Allman, M., Ostermann, S., and C. Metz. "FTP Extensions for IPv6 and NATs", RFC 2428. September 1998. Clark, Martin P.. Data Networks, IP, and the Internet: Protocols, design, and operation. Chichester, West Sussex

Virtual Private Networks

4352 words - 18 pages all incorporate encryption algorithms as part of their design. Each protocol has several different encryption algorithms available to choose from when the VPN software is installed either on a client or a server. It is important to note that when adding new sites to a VPN network, each server or client must be defined using the same protocol and encryption algorithm. Installation considerations will be discussed later in this paper. There are

The Evolution of TCPIP and The Internet

1422 words - 6 pages , economical data networks. The modern Internet began as a U.S. Department of Defense (DoD) funded experiment to interconnect DoD-funded research sites in the U.S. In December 1968, the Advanced Research Projects Agency (ARPA) awarded a contract to design and deploy a packet switching network to Bolt Beranek and Newman (BBN). In September 1969, the first node of the ARPANET was installed at UCLA. With four nodes by the end of 1969, the ARPANET

Workplace Telecommunications

762 words - 3 pages . The Citrix architectural elements required are a secure endpoint, access security and control, delivery services, presentation services and real-time collaboration control services. The server runs the application using the Independent Computing Architecture (ICA) protocol to send screen updates back to the client for viewing and control. The ICA protocol transports keystrokes, mouse activity and screen updates over standard protocols to the

Statement of Purpose

962 words - 4 pages and 2012 with Inclusive Design institute. In 2011 I worked on the implementation of SUDO access in SSSD, LDAP client software with my mentor Mr. Stephen Gallagher from Redhat. I had to research on the best possible way of implementing SUDO powered LDAP client and how to minimize security threats. The biggest thrill was that what I coded was getting to millions and to their day-to-day life. Project helped me to understand more on the security

Key Management for Multicast Groups using Broadcast Encryption and Group Key Agreement

583 words - 3 pages of trusted aspect. In section III gives a details view to design a secure key management model for Thailand quantum cryptography network based on custom protocols and step of work. Section IV shows an experimental result of the quantum key generation updated in real time.

Defense against Collaborative attacks in MANET

1731 words - 7 pages -mail can be used for file transfer and it also used in multimedia applications. It is also used in disaster recovery such as earthquake, tsunamis etc. In MANET, the nodes are free to move, it will change its connection to other devices frequently. An important issue in MANET is routing between two nodes, due to the changing topology of the network. The routing protocol should be secure to protocol to protect against network attacks such as Black

Java Web Services Technologies: Java API for XML Web Services (JAX-WS) and Java API for RESTful Web Services (JAX-RS)

1547 words - 7 pages platform provides the XML and RESTful APIs and tools needed to quickly design, develop, test, and deploy web services and clients that fully interoperate with other web services and clients running on Java-based or non-Java-based platforms. REST (Representational State Transfer) is an architectural style which is based on web-standards and the HTTP protocol. The RESTFul web services are based on HTTP methods (POST, GET, PUT, DELETE). XML Web Services

Similar Essays

Electronic Voting And What Should Be Done

1091 words - 4 pages solve this type problem is to try to make the voting machines work without fail but to never assume it won’t fail. As we’ve seen from the arrogance of the engineers of the Titanic or from the 2004 New York Yankees, just because it looks and sounds workable, we should never assume these machines will do what it should. By this, I don’t mean the system should fail completely but we should design the system to constantly self-check itself to insure

Electronic Voting Essay

3444 words - 14 pages outcome. The design of a good voting system i.e. either electronic or a traditional paper system should satisfy the number of competing representatives. Voting machines have a different level of usability, security, efficiency and also accuracy. Certain systems may be more or less accessible to all votes, or not accessible to those votes with certain types of disabilities. Some say that this e-voting is good in terms of political elections in a

Cryptographic Protocols For Electronic Voting Essay

6667 words - 27 pages , "A secure Internet voting system is theoretically possible, but it would be the first secure networked application ever created in the history of computers." Computer scientist Peter Neumann warns, "the Internet is not safe for elections, due to its vast potential for disruption by viruses, denial-of-service flooding, spoofing, and other commonplace malicious interventions." [MERC2002] Voters in the state of Oregon vote by mail. Paper

Mutual Authentication Mechanism For Rfid Systems Essay

3703 words - 15 pages time. Finally author presents a full-disclosure attack on CWH protocol by sending malicious queries to the tag and collecting the response messages emitted by the tag; this attack allows an adversary to extract the secret information from the tag. • The Author in this paper showed that the LAK protocol cannot resist replay attacks. • How to design a secure ultra-lightweight RFID authentication protocol is now an open problem. In the work done