Analyze e-voting protocols Harvard Case Solution & Analysis

Analyze e-voting protocols Case Study Solution

Section 2: About your Practicum

Please answer all questions below.  Please pay special attention to the word counts in all cases.

What is the topic of your proposed practicum? (100 words)

The topic which has been proposed is analysing the e-voting protocols. Electronic voting refers to voting through various electronic methods. The various types of electronics are through punch cards, optical scanning, DRE (direct recording electronic) and internet voting. The E-voting system could be adapted to two environments which controlled and non-controlled environment. The controlled environment voting could be conducted through punch cards, optical scan and direct recording electronic. Whereas the uncontrolled environment voting refers to vote from any place such as a person could vote even from his home by accessing the computer. The purpose of this research is to analyse the problems faced during e-voting protocols.
Please provide details of the papers you have read on this topic (details of 5 papers expected).

  1. One of the e-voting protocol research paper is the analysis of an internet voting protocol in which it was found that cryptographic protocol is not considered perfect, however, it is suitable in several occasions(Gjøsteen, 2007).
  2. Another of the research was the analysis of an electronic voting system in which it was found that the old punch card method is replaced as it contained the threat from both internal and outside sources. It was suggested that the new system which is the computerized voting system be implemented which would minimize the risks(Wallach & Kohno, 2004).

3.Another research had been conducted on the SEAS design and implementation. SEAS refers to the secure e-voting applet system which one of most used e-voting protocols, however, it was found out that the protocol has a vulnerability by the entities(Baiardi, 2005).

  1. Another of a research was conducted in the analysis of security required for the cryptographic voting protocol. The cryptographic voting protocol helps in providing fairness, uniqueness and accuracy to the e-voting. Although the cryptographic voting protocol is vulnerable to individual verifiability and receipt-freeness(Cetinkaya, 2008).
  2. One of the research was on the cryptographic voting protocols: a systems perspective in which it was found that there are several weakness in the cryptographic voting protocols such as the weakness in reliability, subliminal channels and encrypted ballots(Karlof, 2005).

    How does your proposal relate to existing work on this topic described in these papers? (200 words)

The above-mentioned researchers which have been conducted are pretty much similar to my research as the topic is related with the analysing of e-voting protocols. One of the research was conducted in Norwegian as the government decided to hold the elections through using e-voting system in the year 2011. It was found that the cryptographic protocol used in the e-voting was not perfect however the privacy of the voters is well-protected.

Another research carried in the US voting system in which it was found that the punch card and the outdated mechanical voting system had been identified with various problems. The problems which had been identified were threats to the network system, improper usage of the cryptographic and it had poor software process. This outdated punch card and the mechanical system had posed a threat for internal and outsider attacks. It was suggested to implement the voting system which is computerized. The research has tried to analyse the voting system which concluded that general elections should not contain electronic voting because it is not suitable for it. Moreover, there should be an audit trail for verifying the votes and result in the better solution for voting systems through the print of a ballot paper for a computerized voting system which will automatically verify the voter after reading it.
What are the research questions that you will attempt to answer?  (200 words)

How would you verify the security protocols automatically by analysing the e-voting protocols?

How would the e-voting protocol ensure voter’s information privacy?

How would the authorization of the voter be determined through e-voting protocols?

How will you explore these questions? (Please address the following points.  Note that three or four sentences on each will suffice.)

These questions will be explored by collecting the data and tools used for gathering the data for variables such as information privacy issues and the problems for authorization of voter to identify the authenticity of its actual vote through computerized voting by using ballot paper and analysis of data through Scyther automated protocol analyser which will provide the output results of the coded data in a manner comprehensive manner for automatic analysis of the coding generated through protocols.
- What software and programming environment will you use?

The Scyther automated protocol analyser would be used for conducting the analysis of the e-voting protocol to determine its privacy, verification and encryption of the voter.

- What coding/development will you do?

We would represent the protocol’s flow, process, roles and claims. It will be encoded as modules and the development of authorization of voting policy and code of authority will be coded. This will also test the encoding by counting the number of votes through coding it.
- What data will be used for your investigations?

Type of data would mainly be based on the privacy of votes and verifi ability of the data for voting. The data would be based on the e-voting done in US elections.
- Is this data currently available, if not, where will it come from?

The data is currently available as we would be using the data of US elections where e-voting option was available and it would be easier to verify the above-mentioned coding.
- What experiments do you expect to run?

Automated verifications would consist of the experiments such as logical refinements which will be run through the accessibility of the underlying properties of algebraic expressions.
- What output do you expect to gather?

The output related to the privacy of voters and its breach would be gathered along with the efficiency of data for testing the authenticity and authorization of voting rights will be gathered.
- How will the results be evaluated?

Results will be evaluated by using the output data to verify the available results through effectively using the software for analysing the e-voting protocol results in Scyther automated protocol analyser software.....................

This is just a sample partial work. Please place the order on the website to get your own originally done case solution.


Share This


Save Up To




Register now and save up to 30%.