2. Estonian e-Voting @ a Glance:
•Estonian ID or Smart card bearing digital
signatures is used for authentication.
•Voter’s can vote any number of times.
•In case of any attacks election
commission cancels the e-Voting and
cancels the result
SERVE e-Voting System @ a Glance
•No ID’s or Public Key Infrastructures.
•One person, one vote.
•Possible to vote any time within 30days before
election day until the closing day of poll.
•In case of any attack the Election commission
terminates the voting & cancels the result.
The main disadvantages in these systems are:
->In case if a voter’s id is lost then someone else can cast their
vote
->The steps for authentication is Voter’s ID and Password which
can be hacked easily now a days….
3. Preliminary verification
Receives Voter’s choice &
Encrypts it.
Checks Whether ID Belongs to
the Bearer.
Storing, Managing &
Decrypting Votes
for counting.
Counts the
Votes.
6. • HASH SEARCHING.
• The table in the database in such a way that the
searching is made easy.
• The data's occupies the place based upon the hash
value computed by the function ,
f(n)=id mod (size of table)
• The search success is within one or two attempts.
7.
8. Heavy web users have an
average of 21 passwords:81% of
users select a common
passwords and 30% write their
passwords in a file which can be
HACKED easily.
Identity theft: Identity thieves steal
PIN numbers.3.3 million identity
thefts in U.S in 2002 ;6.7 millions
victims of credit card fraud
9. Bio-Smart card
FEATURES OF SMART CARD:
Imp ringed DNA chip which bears ,
->Voter’s face
->Voter’s finger print
->Voter’s details
DNA CHIP<Local
memory>
10. Step:1-Voter inserts
the card
Step:2-Camera captures the face
of the voter and fingerprint
recognizer gets the finger print.
Step:3-Checks whether the voter who passes the first
test is found in the voters list.
13. DNA cryptosystem consisting of
DNA Chip
Randomly assembled one-time pad.
Encryption and Decryption is recorded in
arrays of DNA chip.
The One-Time-Pad principle is applied (an
unbreakable cryptosystem).
Cryptography consist of
Encryption (at the source end )
Decryption (at the destination end)
14.
15. This phase is done only by the authenticated election
commission officials.
Vote management consist of :
Decryption
Storing of messages
Decryption :
Here the coded message is converted to the readable
original message only by the authorized officials .
16.
17. Reasons for using DNA storage:
• Resists all kind of attacks-
Alteration or destroying data is
highly impossible.
• High memory capacity-The
DNA inherits all the traits and
characteristics of our ancestors.
The human genome embodies
the equivalent of 750 megabytes
of data, a huge storage space.
DNA Achieve Stores tons
of information
18. An up-counter is used
to count the individual
votes at the each data
table level
The display can be
shown with a BCD-to-
seven segment decoder
and a LCD display .
UP
counter
19. On the whole this voting machine is evolved towards
a motto to have fool proof access with a high speed ,
memory and resistance to threats to safeguard the
fundamental right of every citizen .
As much as the various features offered by the DNA
e-voting we have some crucial problems at each
level which needs to be overcome .
Lots of work resources required to develop it into a
fully fledged product.
20. So far we have successfully tried the Process of
Annelations viz Separation of DNA into 2 individual
strands .
It has to be kept in a low temperature only
The cost of one DNA isolation process has been
Rs.2500 and it takes a whole 24 hours for 1 complete
isolation .
21. DNA Based Cryptography by Ashish Gehani,Thomas
Labean,John Reif.
http://www2.computer.org/portal/web/csdl/doi/10.1109/M
DNA as a Mass-Storage Device by Robert J.Robbins.
DNA Computing and its Application by Junzo
Watada.
Electronic Voting & Cryptography ISRC Workshop,
Queensland University of Technology.