Evoting2003

Post on 16-Jul-2015

26 views 1 download

Tags:

Transcript of Evoting2003

Estonian e-Voting @ a Glance:•Estonian ID or Smart card bearing digital signatures is used for authentication.

•Voter’s can vote any number of times.

•In case of any attacks election commission cancels the e-Voting and cancels the result

SERVE e-Voting System @ a Glance•No ID’s or Public Key Infrastructures.•One person, one vote.•Possible to vote any time within 30days before election day until the closing day of poll.•In case of any attack the Election commission terminates the voting & cancels the result.

The main disadvantages in these systems are:->In case if a voter’s id is lost then someone else can cast their vote->The steps for authentication is Voter’s ID and Password which can be hacked easily now a days….

Preliminary verification

Receives Voter’s choice & Encrypts it.

Checks Whether ID Belongs to the Bearer.

Storing, Managing & Decrypting Votes

for counting.

Counts the Votes.

Authentication: BiometricsCryptosystem for safe transmission:DNA

cryptosystemStorage device:DNA storage.

• HASH SEARCHING.• The table in the database in such a way that the

searching is made easy.• The data's occupies the place based upon the hash

value computed by the function ,f(n)=id mod (size of table)

• The search success is within one or two attempts.

Heavy web users have an average of 21 passwords:81% of users select a common passwords and 30% write their passwords in a file which can be HACKED easily.

Identity theft: Identity thieves steal PIN numbers.3.3 million identity thefts in U.S in 2002 ;6.7 millions victims of credit card fraud

Bio-Smart card FEATURES OF SMART CARD:Imp ringed DNA chip which bears ,

->Voter’s face->Voter’s finger print->Voter’s details

DNA CHIP<Local memory>

Step:1-Voter inserts the card

Step:2-Camera captures the face of the voter and fingerprint

recognizer gets the finger print.

Step:3-Checks whether the voter who passes the first test is found in the voters list.

• “No Null Votes/Multiple Votes”• Microcontroller used:AT89S8252

secure client-server data transfer

No unauthorized data manipulation

DNA cryptosystem consisting of DNA ChipRandomly assembled one-time pad.Encryption and Decryption is recorded in

arrays of DNA chip. The One-Time-Pad principle is applied (an

unbreakable cryptosystem).Cryptography consist of

Encryption (at the source end )Decryption (at the destination end)

This phase is done only by the authenticated election commission officials.

Vote management consist of : Decryption Storing of messages

Decryption :Here the coded message is converted to the readable

original message only by the authorized officials .

Reasons for using DNA storage:• Resists all kind of attacks-

Alteration or destroying data is highly impossible.

• High memory capacity-The DNA inherits all the traits and characteristics of our ancestors. The human genome embodies the equivalent of 750 megabytes of data, a huge storage space.

DNA Achieve Stores tons of information

An up-counter is used to count the individual votes at the each data table level

The display can be shown with a BCD-to-seven segment decoder and a LCD display .

UP counter

On the whole this voting machine is evolved towards a motto to have fool proof access with a high speed , memory and resistance to threats to safeguard the fundamental right of every citizen .

As much as the various features offered by the DNA e-voting we have some crucial problems at each level which needs to be overcome .

Lots of work resources required to develop it into a fully fledged product.

So far we have successfully tried the Process of Annelations viz Separation of DNA into 2 individual strands .

It has to be kept in a low temperature only The cost of one DNA isolation process has been

Rs.2500 and it takes a whole 24 hours for 1 complete isolation .

DNA Based Cryptography by Ashish Gehani,Thomas Labean,John Reif.

http://www2.computer.org/portal/web/csdl/doi/10.1109/MSP.2008.57DNA as a Mass-Storage Device by Robert J.Robbins.DNA Computing and its Application by Junzo

Watada.Electronic Voting & Cryptography ISRC Workshop,

Queensland University of Technology.