SlideShare une entreprise Scribd logo
1  sur  22
Estonian e-Voting @ a Glance:
•Estonian ID or Smart card bearing digital
signatures is used for authentication.
•Voter’s can vote any number of times.
•In case of any attacks election
commission cancels the e-Voting and
cancels the result
SERVE e-Voting System @ a Glance
•No ID’s or Public Key Infrastructures.
•One person, one vote.
•Possible to vote any time within 30days before
election day until the closing day of poll.
•In case of any attack the Election commission
terminates the voting & cancels the result.
The main disadvantages in these systems are:
->In case if a voter’s id is lost then someone else can cast their
vote
->The steps for authentication is Voter’s ID and Password which
can be hacked easily now a days….
Preliminary verification
Receives Voter’s choice &
Encrypts it.
Checks Whether ID Belongs to
the Bearer.
Storing, Managing &
Decrypting Votes
for counting.
Counts the
Votes.
Authentication: Biometrics
Cryptosystem for safe transmission:DNA
cryptosystem
Storage device:DNA storage.
• HASH SEARCHING.
• The table in the database in such a way that the
searching is made easy.
• The data's occupies the place based upon the hash
value computed by the function ,
f(n)=id mod (size of table)
• The search success is within one or two attempts.
Heavy web users have an
average of 21 passwords:81% of
users select a common
passwords and 30% write their
passwords in a file which can be
HACKED easily.
Identity theft: Identity thieves steal
PIN numbers.3.3 million identity
thefts in U.S in 2002 ;6.7 millions
victims of credit card fraud
Bio-Smart card
FEATURES OF SMART CARD:
Imp ringed DNA chip which bears ,
->Voter’s face
->Voter’s finger print
->Voter’s details
DNA CHIP<Local
memory>
Step:1-Voter inserts
the card
Step:2-Camera captures the face
of the voter and fingerprint
recognizer gets the finger print.
Step:3-Checks whether the voter who passes the first
test is found in the voters list.
• “No Null Votes/Multiple Votes”
• Microcontroller used:AT89S8252
secure client-
server data
transfer
No unauthorized
data manipulation
 DNA cryptosystem consisting of
 DNA Chip
 Randomly assembled one-time pad.
 Encryption and Decryption is recorded in
arrays of DNA chip.
The One-Time-Pad principle is applied (an
unbreakable cryptosystem).
Cryptography consist of
Encryption (at the source end )
Decryption (at the destination end)
This phase is done only by the authenticated election
commission officials.
 Vote management consist of :
 Decryption
 Storing of messages
Decryption :
Here the coded message is converted to the readable
original message only by the authorized officials .
Reasons for using DNA storage:
• Resists all kind of attacks-
Alteration or destroying data is
highly impossible.
• High memory capacity-The
DNA inherits all the traits and
characteristics of our ancestors.
The human genome embodies
the equivalent of 750 megabytes
of data, a huge storage space.
DNA Achieve Stores tons
of information
An up-counter is used
to count the individual
votes at the each data
table level
The display can be
shown with a BCD-to-
seven segment decoder
and a LCD display .
UP
counter
On the whole this voting machine is evolved towards
a motto to have fool proof access with a high speed ,
memory and resistance to threats to safeguard the
fundamental right of every citizen .
As much as the various features offered by the DNA
e-voting we have some crucial problems at each
level which needs to be overcome .
Lots of work resources required to develop it into a
fully fledged product.
So far we have successfully tried the Process of
Annelations viz Separation of DNA into 2 individual
strands .
It has to be kept in a low temperature only
The cost of one DNA isolation process has been
Rs.2500 and it takes a whole 24 hours for 1 complete
isolation .
DNA Based Cryptography by Ashish Gehani,Thomas
Labean,John Reif.
http://www2.computer.org/portal/web/csdl/doi/10.1109/M
DNA as a Mass-Storage Device by Robert J.Robbins.
DNA Computing and its Application by Junzo
Watada.
Electronic Voting & Cryptography ISRC Workshop,
Queensland University of Technology.
Evoting2003

Contenu connexe

Tendances

IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415
Shubham Jadhav
 

Tendances (10)

BiATM Voting
BiATM VotingBiATM Voting
BiATM Voting
 
Secure electronic voting system using fingerprint technique
Secure electronic voting system using fingerprint techniqueSecure electronic voting system using fingerprint technique
Secure electronic voting system using fingerprint technique
 
Biometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded securityBiometrics using electronic voting system with embedded security
Biometrics using electronic voting system with embedded security
 
IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415IEEE_paper_work11_2015_12_03_20_49_47_415
IEEE_paper_work11_2015_12_03_20_49_47_415
 
Smart Voting System using Aadhar Card
Smart Voting System using Aadhar CardSmart Voting System using Aadhar Card
Smart Voting System using Aadhar Card
 
e-voting system
e-voting systeme-voting system
e-voting system
 
Aadhar Based Electronic Voting Machine
Aadhar Based Electronic Voting MachineAadhar Based Electronic Voting Machine
Aadhar Based Electronic Voting Machine
 
finger print sensor
finger print sensor finger print sensor
finger print sensor
 
Fingerprint based voting machine ppt
Fingerprint based voting machine pptFingerprint based voting machine ppt
Fingerprint based voting machine ppt
 
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 MicrocontrollerBiometric System Based Electronic Voting Machine Using Arm9 Microcontroller
Biometric System Based Electronic Voting Machine Using Arm9 Microcontroller
 

Similaire à Evoting2003

Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
Sampat Patnaik
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
TeenaSharma73
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
Editor IJARCET
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
Editor IJARCET
 

Similaire à Evoting2003 (20)

Bio Metric-E-Voting
Bio Metric-E-VotingBio Metric-E-Voting
Bio Metric-E-Voting
 
Embedded system
Embedded systemEmbedded system
Embedded system
 
IRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting SystemIRJET- Portable Biometric E-Voting System
IRJET- Portable Biometric E-Voting System
 
Biometric security using cryptography
Biometric security using cryptographyBiometric security using cryptography
Biometric security using cryptography
 
4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx4.2.1 Network Issues and Communication.pptx
4.2.1 Network Issues and Communication.pptx
 
4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx4.2.1 Network Issues and Communication [Autosaved].pptx
4.2.1 Network Issues and Communication [Autosaved].pptx
 
Biometrics fingerprint
Biometrics fingerprintBiometrics fingerprint
Biometrics fingerprint
 
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malwareDEF CON 23 - Weston Hecker - goodbye memory scraping malware
DEF CON 23 - Weston Hecker - goodbye memory scraping malware
 
Biometrics/fingerprint sensors
Biometrics/fingerprint sensorsBiometrics/fingerprint sensors
Biometrics/fingerprint sensors
 
Alternatives to Paswords
Alternatives to PaswordsAlternatives to Paswords
Alternatives to Paswords
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261Ijarcet vol-2-issue-7-2258-2261
Ijarcet vol-2-issue-7-2258-2261
 
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIABIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
BIOMETRIC VOTING SYSTEM USING ADHAR CARD IN INDIA
 
Computerised voting system
Computerised voting systemComputerised voting system
Computerised voting system
 
It's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdfIt's about biometric system L10A_Savvides_Biometrics.pdf
It's about biometric system L10A_Savvides_Biometrics.pdf
 
E-Voting Technology
E-Voting TechnologyE-Voting Technology
E-Voting Technology
 
Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System  Avoiding Phishing Attacks in Online Voting System
Avoiding Phishing Attacks in Online Voting System
 
Trends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yoursTrends in electronic crimes and its impact on businesses like yours
Trends in electronic crimes and its impact on businesses like yours
 
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEMBm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
Bm 05 FINGERPRINT BASED ELECTRONIC VOTING SYSTEM
 
Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1Marcos de Pedro Neoris authenware_cybersecurity step1
Marcos de Pedro Neoris authenware_cybersecurity step1
 

Plus de Meenakshi Chandrasekaran (12)

Certification
CertificationCertification
Certification
 
Links todwnload
Links todwnloadLinks todwnload
Links todwnload
 
Pl sql
Pl sqlPl sql
Pl sql
 
Hibernate 1x2
Hibernate 1x2Hibernate 1x2
Hibernate 1x2
 
Workbench en
Workbench enWorkbench en
Workbench en
 
My sql installation
My sql installationMy sql installation
My sql installation
 
Work benchinstallation
Work benchinstallationWork benchinstallation
Work benchinstallation
 
Jdbc
JdbcJdbc
Jdbc
 
Tjava10a
Tjava10aTjava10a
Tjava10a
 
Ejbe slides
Ejbe  slidesEjbe  slides
Ejbe slides
 
J2 ee
J2 eeJ2 ee
J2 ee
 
Bio_Computing
Bio_ComputingBio_Computing
Bio_Computing
 

Evoting2003

  • 1.
  • 2. Estonian e-Voting @ a Glance: •Estonian ID or Smart card bearing digital signatures is used for authentication. •Voter’s can vote any number of times. •In case of any attacks election commission cancels the e-Voting and cancels the result SERVE e-Voting System @ a Glance •No ID’s or Public Key Infrastructures. •One person, one vote. •Possible to vote any time within 30days before election day until the closing day of poll. •In case of any attack the Election commission terminates the voting & cancels the result. The main disadvantages in these systems are: ->In case if a voter’s id is lost then someone else can cast their vote ->The steps for authentication is Voter’s ID and Password which can be hacked easily now a days….
  • 3. Preliminary verification Receives Voter’s choice & Encrypts it. Checks Whether ID Belongs to the Bearer. Storing, Managing & Decrypting Votes for counting. Counts the Votes.
  • 4. Authentication: Biometrics Cryptosystem for safe transmission:DNA cryptosystem Storage device:DNA storage.
  • 5.
  • 6. • HASH SEARCHING. • The table in the database in such a way that the searching is made easy. • The data's occupies the place based upon the hash value computed by the function , f(n)=id mod (size of table) • The search success is within one or two attempts.
  • 7.
  • 8. Heavy web users have an average of 21 passwords:81% of users select a common passwords and 30% write their passwords in a file which can be HACKED easily. Identity theft: Identity thieves steal PIN numbers.3.3 million identity thefts in U.S in 2002 ;6.7 millions victims of credit card fraud
  • 9. Bio-Smart card FEATURES OF SMART CARD: Imp ringed DNA chip which bears , ->Voter’s face ->Voter’s finger print ->Voter’s details DNA CHIP<Local memory>
  • 10. Step:1-Voter inserts the card Step:2-Camera captures the face of the voter and fingerprint recognizer gets the finger print. Step:3-Checks whether the voter who passes the first test is found in the voters list.
  • 11. • “No Null Votes/Multiple Votes” • Microcontroller used:AT89S8252
  • 12. secure client- server data transfer No unauthorized data manipulation
  • 13.  DNA cryptosystem consisting of  DNA Chip  Randomly assembled one-time pad.  Encryption and Decryption is recorded in arrays of DNA chip. The One-Time-Pad principle is applied (an unbreakable cryptosystem). Cryptography consist of Encryption (at the source end ) Decryption (at the destination end)
  • 14.
  • 15. This phase is done only by the authenticated election commission officials.  Vote management consist of :  Decryption  Storing of messages Decryption : Here the coded message is converted to the readable original message only by the authorized officials .
  • 16.
  • 17. Reasons for using DNA storage: • Resists all kind of attacks- Alteration or destroying data is highly impossible. • High memory capacity-The DNA inherits all the traits and characteristics of our ancestors. The human genome embodies the equivalent of 750 megabytes of data, a huge storage space. DNA Achieve Stores tons of information
  • 18. An up-counter is used to count the individual votes at the each data table level The display can be shown with a BCD-to- seven segment decoder and a LCD display . UP counter
  • 19. On the whole this voting machine is evolved towards a motto to have fool proof access with a high speed , memory and resistance to threats to safeguard the fundamental right of every citizen . As much as the various features offered by the DNA e-voting we have some crucial problems at each level which needs to be overcome . Lots of work resources required to develop it into a fully fledged product.
  • 20. So far we have successfully tried the Process of Annelations viz Separation of DNA into 2 individual strands . It has to be kept in a low temperature only The cost of one DNA isolation process has been Rs.2500 and it takes a whole 24 hours for 1 complete isolation .
  • 21. DNA Based Cryptography by Ashish Gehani,Thomas Labean,John Reif. http://www2.computer.org/portal/web/csdl/doi/10.1109/M DNA as a Mass-Storage Device by Robert J.Robbins. DNA Computing and its Application by Junzo Watada. Electronic Voting & Cryptography ISRC Workshop, Queensland University of Technology.