CSCI-UA.9480 Introduction to Computer Security
Session 1.8
E-Voting and Other Modern Uses of Cryptography
- Prof. Nadim Kobeissi
CSCI-UA.9480 Introduction to Computer Security Session 1.8 - - PowerPoint PPT Presentation
CSCI-UA.9480 Introduction to Computer Security Session 1.8 E-Voting and Other Modern Uses of Cryptography Prof. Nadim Kobeissi 1.8a Electronic Voting 2 CSCI-UA.9480: Introduction to Computer Security Nadim Kobeissi Properties of an
CSCI-UA.9480 Introduction to Computer Security
Session 1.8
E-Voting and Other Modern Uses of Cryptography
Electronic Voting
2 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiProperties of an traditional system.
Traditional voting process.
4 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi Source: Electoral CommissionSo what’s the problem?
What about electronic voting machines?
Swiss Post’s E-voting Solution.
Swiss Post’s E-voting solution.
8 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiSame security goals apply.
Threat modeling for e-voting.
So is e-voting even worth it?
Computing on encrypted data.
Applications to e-voting: referendum case.
What about coercion, remote impersonation?
ElGamal is partially homomorphic.
15 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi Secret key: x Public key: (G, q, g, h = gx) Source: WikipediaLooking at Swiss E-voting’s cryptography.
Swiss E-voting protocol workflow.
17 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiSwiss E-voting protocol workflow.
18 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiSwiss E-voting protocol workflow.
19 CSCI-UA.9480: Introduction to Computer Security – Nadim KobeissiNext time: Networking Basics, TCP, IP and DNS
The first session in Part 2 of our course: Network Security.
20 CSCI-UA.9480: Introduction to Computer Security – Nadim Kobeissi