Evoting2003

22

Transcript of Evoting2003

Page 1: Evoting2003
Page 2: Evoting2003

Estonian e-Voting @ a Glance:•Estonian ID or Smart card bearing digital signatures is used for authentication.

•Voter’s can vote any number of times.

•In case of any attacks election commission cancels the e-Voting and cancels the result

SERVE e-Voting System @ a Glance•No ID’s or Public Key Infrastructures.•One person, one vote.•Possible to vote any time within 30days before election day until the closing day of poll.•In case of any attack the Election commission terminates the voting & cancels the result.

The main disadvantages in these systems are:->In case if a voter’s id is lost then someone else can cast their vote->The steps for authentication is Voter’s ID and Password which can be hacked easily now a days….

Page 3: Evoting2003

Preliminary verification

Receives Voter’s choice & Encrypts it.

Checks Whether ID Belongs to the Bearer.

Storing, Managing & Decrypting Votes

for counting.

Counts the Votes.

Page 4: Evoting2003

Authentication: BiometricsCryptosystem for safe transmission:DNA

cryptosystemStorage device:DNA storage.

Page 5: Evoting2003
Page 6: Evoting2003

• HASH SEARCHING.• The table in the database in such a way that the

searching is made easy.• The data's occupies the place based upon the hash

value computed by the function ,f(n)=id mod (size of table)

• The search success is within one or two attempts.

Page 7: Evoting2003
Page 8: Evoting2003

Heavy web users have an average of 21 passwords:81% of users select a common passwords and 30% write their passwords in a file which can be HACKED easily.

Identity theft: Identity thieves steal PIN numbers.3.3 million identity thefts in U.S in 2002 ;6.7 millions victims of credit card fraud

Page 9: Evoting2003

Bio-Smart card FEATURES OF SMART CARD:Imp ringed DNA chip which bears ,

->Voter’s face->Voter’s finger print->Voter’s details

DNA CHIP<Local memory>

Page 10: Evoting2003

Step:1-Voter inserts the card

Step:2-Camera captures the face of the voter and fingerprint

recognizer gets the finger print.

Step:3-Checks whether the voter who passes the first test is found in the voters list.

Page 11: Evoting2003

• “No Null Votes/Multiple Votes”• Microcontroller used:AT89S8252

Page 12: Evoting2003

secure client-server data transfer

No unauthorized data manipulation

Page 13: Evoting2003

DNA cryptosystem consisting of DNA ChipRandomly assembled one-time pad.Encryption and Decryption is recorded in

arrays of DNA chip. The One-Time-Pad principle is applied (an

unbreakable cryptosystem).Cryptography consist of

Encryption (at the source end )Decryption (at the destination end)

Page 14: Evoting2003
Page 15: Evoting2003

This phase is done only by the authenticated election commission officials.

Vote management consist of : Decryption Storing of messages

Decryption :Here the coded message is converted to the readable

original message only by the authorized officials .

Page 16: Evoting2003
Page 17: Evoting2003

Reasons for using DNA storage:• Resists all kind of attacks-

Alteration or destroying data is highly impossible.

• High memory capacity-The DNA inherits all the traits and characteristics of our ancestors. The human genome embodies the equivalent of 750 megabytes of data, a huge storage space.

DNA Achieve Stores tons of information

Page 18: Evoting2003

An up-counter is used to count the individual votes at the each data table level

The display can be shown with a BCD-to-seven segment decoder and a LCD display .

UP counter

Page 19: Evoting2003

On the whole this voting machine is evolved towards a motto to have fool proof access with a high speed , memory and resistance to threats to safeguard the fundamental right of every citizen .

As much as the various features offered by the DNA e-voting we have some crucial problems at each level which needs to be overcome .

Lots of work resources required to develop it into a fully fledged product.

Page 20: Evoting2003

So far we have successfully tried the Process of Annelations viz Separation of DNA into 2 individual strands .

It has to be kept in a low temperature only The cost of one DNA isolation process has been

Rs.2500 and it takes a whole 24 hours for 1 complete isolation .

Page 21: Evoting2003

DNA Based Cryptography by Ashish Gehani,Thomas Labean,John Reif.

http://www2.computer.org/portal/web/csdl/doi/10.1109/MSP.2008.57DNA as a Mass-Storage Device by Robert J.Robbins.DNA Computing and its Application by Junzo

Watada.Electronic Voting & Cryptography ISRC Workshop,

Queensland University of Technology.

Page 22: Evoting2003