E-voting …and why it’s good..

Slides:



Advertisements
Similar presentations
Trusting the Vote Ben Adida - Cryptography and Information Security Group MIT Computer Science and Artificial.
Advertisements

Electronic Voting Systems
Online Voting System State Election Commission, Gujarat
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
Good or Bad?.  One of the closest contests in US history  Florida was the pivotal state  Neither Democrat Al Gore nor Republican George W. Bush had.
Will Your Vote Count? Will your vote count? Voting machine choices N.C. Coalition for Verified Voting Joyce McCloy Pros and Cons of voting.
ETen E-Poll ID – Strasbourg COE meeting November, 2006 Slide 1 E-TEN E-POLL Project Electronic Polling System for Remote Operation Strasbourg.
ICT IN THE ELECTORAL PROCESS: LESSONS LEARNED Susanne Caarls International Electoral Affairs Symposium May 2012.
Presentation on the Electronically Managed Polling Station. Ministry of the Interior. Spain. 7th European Conference of Electoral Management Bodies “EVERY.
SECURITY IN E-COMMERCE VARNA FREE UNIVERSITY Prof. Teodora Bakardjieva.
Charlie Daniels Arkansas Secretary of State HAVA Compliant Voting Systems Security Considerations General Recommendations to Enhance Security and Integrity.
FIT3105 Security and Identity Management Lecture 1.
Chapter 9 - Control in Computerized Environment ATG 383 – Spring 2002.
Voting Machines Failing the World *Voting machines around the world are failing in Colorado as well as 34 other states. *This could be crucial in the upcoming.
Presentation by Christine McElroy
17-803/ ELECTRONIC VOTING FALL 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS / Electronic Voting Session 2: Paper Trails Michael I. Shamos,
CMSC 414 Computer and Network Security Lecture 8 Jonathan Katz.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Guide to the Voting Action Planner Voting is the way we elect government officials, pass laws and decide on issues…
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012.
E-Voting Dissent Sara Wilson, Katie Noto, John Massie, Will Sutherland, Molly Cooper.
Electronic Voting Ronald L. Rivest MIT Laboratory for Computer Science.
Andreas Steffen, , LinuxTag2009.ppt 1 LinuxTag 2009 Berlin Verifiable E-Voting with Open Source Prof. Dr. Andreas Steffen Hochschule für Technik.
Georgia Electronic Voting System Testing and Security Voting Systems Testing Summit November 29, 2005.
Electronic Voting: The 2004 Election and Beyond Prof. David L. Dill Department of Computer Science Stanford University
The Electoral Process Chapter 7.
CS453: Introduction to Information Security for E-Commerce Prof. Tom Horton.
DIGITAL SIGNATURE.
Traditional Security Issues Confidentiality –Prevent unauthorized access or reading of information Integrity –Insure that writing or operations are allowed.
Against E-Voting Ryan Egan, Amber Jones, Alyssa Sankin, Page Stephens, Amber Straight, Philip Sugg, and Diana Troisi Direct recording electronic (DRE)
Online Voting : A New Beginning State Election Commission, Gujarat Prototype explaining concept Note: Actual screens on the day of voting may be different.
Welcome Topic : Security.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
WHY THE vvpat has failed
Secure Remote Electronic Voting CSE-681 Fall 2006 David Foster and Laura Stapleton Laura StapletonLaura Stapleton.
VVPAT Building Confidence in U.S. Elections. WHAT IS VVPAT ? Voter-verifiable paper audit trail Requires the voting system to print a paper ballot containing.
7 th Grade Civics Miss Smith *pgs  Must be 18 years old by a set date before the next election  Voter registration protects your vote  No.
Election Reform The Open Voting Consortium. Elections are important Voting is how we ultimately control.our government Many elections are decided by just.
12/9-10/2009 TGDC Meeting The VVSG Version 1.1 Overview John P. Wack National Institute of Standards and Technology
Chapter 10 Voting and Elections. Qualifications of Voting 18 years old a US citizen Registered to vote Resident of voting district.
Association of World Election Bodies Contents ICT–based Election Management Voter Registration and Identification Voting and Counting Examples.
Information Systems Design and Development Security Precautions Computing Science.
What is electronic voting An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily.
E-Voting Application using Internal Vtoken Bowo Prasetyo Isolated e-Voting System in a Precinct Secured with Vote Sealing and Paper Audit Trail December.
Unit 3 Section 6.4: Internet Security
Security Issues in Information Technology
The Secure Sockets Layer (SSL) Protocol
Evaluating risk within the context of the voting process
EVoting 23 October 2006.
Crypto in information security
ThreeBallot, VAV, and Twin
Con Electronic Voting Preston Pope, Zach White, Ankit Shrivastava, Max Alexander.
A project of Common Cause Texas
Voting.
Ronald L. Rivest MIT Laboratory for Computer Science
Electronic Voting Machine Using MSP430 With Voice Feedback System
Electronic voting – safe or not?
Information and Network Security
Improving Reliability of Direct Recording Electronic Voting Systems
Chapter 10 Voting and Elections.
ISI Day – 20th Anniversary
Slide Deck: The Voting Process (Municipal Elections)
eVoting System Proposal
The Secure Sockets Layer (SSL) Protocol
Best Digital Signature Service in Noida. Electronic Record 1.Very easy to make copies 2.Very fast distribution 3.Easy archiving and retrieval 4.Copies.
Essential Question What are the procedures for voting?
7th Grade Civics Miss Smith *pgs
The Italian Academic Community’s Electronic Voting System
Presentation transcript:

E-voting …and why it’s good.

Hand Ballots They are the only historically viable choice for voting. They’re small pieces of paper on which voters can fill in or select their representative. However, there are some downsides to hand ballots…

Why hand ballots are bad… Problems with hanging chads and butterfly ballots An MIT study known as the “voter technology project”, concluded that up to 6 million votes were lost in 2000 election 2 million due to poor ballot design 3 million due to outdated registration rolls 1 million due to polling place operations

…more reasons they’re bad Can be lost, changed, misread and added to Counting machine can be manipulated by polling employees (paper hacking attacks) Not user friendly Especially for the seeing impaired

E-Voting A voting technique that takes advantage of computer science and technology through the use of Direct Recording Electronic Terminals.

Direct Recording Electronic Terminals These mechanized terminals use computer software that is activated by the voter to record votes and to save selections in a removable memory component.

Computer Science and E-Voting Cryptography is the mathematical study of information and especially its transmission from place to place All modules are issued their own private keys Modules digitally (using RSA) sign all of their transmissions so that their data transmissions are protected against wiretapping All transmissions are maintained with a secure sockets layer, the most reliable approach for sending info today, protecting the data itself from being read. Same technology used in ATM’s and E-Commerce People are comfortable divulging extremely personal information over the internet, why not trust e-voting?!

Advantages of E-Voting Ballots can be counted instantly Recounts are fast and easy Prevents ballot errors and confusion Detects voter error Possible to display more information about candidates Photos Stance on major issues

Security Measures Number of votes Voter identification In current methods, poll workers can personally insert extra votes into ballot boxes In e-voting, tampering could easily be identified if it created a discrepancy between number of registered voters and number of votes cast Voter identification In current methods, all that is needed is a photo ID In e-voting, could use 10-digit PIN numbers, one time passwords, or fingerprint/retinal scans

Paper Trails Currently, hand ballots provide physical evidence of the vote cast In e-voting, Direct Recording Electronic Terminals can print copies of the vote cast

Security and Validity Encryption prevents others from seeing or tampering with the vote Voters could be given a secret code by which they could verify that their vote had been counted correctly