Skip to main content

Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5060))

Abstract

Rapid growth of computer networks and advances in cryptographic techniques allow new approaches of electronic voting systems. In this research, we present a System-on-Programmable-Chip crypto-bridge module that enables secure ethernet point-to-point connections between electronic ballot boxes and the remote host of the central electoral office through insecure Ethernet networks. The proposed crypto-bridge is implemented using reconfigurable devices, and two implementations are presented: a single channel module and multi-channel module. HDL source code of the AES cipher, Ethernet MAC controller and tiny processor embedded in the crypto-bridge is public and open enforcing the confidence in the system.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Cranor, L.F., Cytron, R.K.: Sensus: A Security-Conscious Electronic Polling System for the Internet. In: Proceedings of the Hawaii International Conference on Systems Sciences, pp. 7–10 (1997)

    Google Scholar 

  2. MTI. Voting, what is what could be, caltech mit voting technology project (July 2001), http://web.mit.edu/voting/

  3. California Internet Voting Task Force. A report on the feasibility of internet voting (January 2000), http://www.ss.ca.gov/executive/ivote/final_report.htm

  4. Goirizelaia, I., Espinosa, K., Martin, J.L., Lázaro, J., Arias, J., Igarza, J.J.: An Electronic Secure Voting System Based on Automatic Paper Ballot Reading. In: Sanfeliu, A., Martínez Trinidad, J.F., Carrasco Ochoa, J.A. (eds.) CIARP 2004. LNCS, vol. 3287, pp. 470–477. Springer, Heidelberg (2004)

    Google Scholar 

  5. Espinosa, J.K., Goirizelaia, I., Igarza, J.J.: OCR Applied to an Electronic Voting System. Pattern Recognition and Image Analysis 17(4), 457–461 (2007)

    Article  Google Scholar 

  6. IEEE-SA Standards Board. IEEE 802.1XTM. IEEE Standard for Local and metropolitan area networks – Port-Based Network Access Control. IEEE-SA Standards (2004)

    Google Scholar 

  7. Chodowiec, P., Gaj, K., Bellows, P., Schott, B.: Experimental Testing of the Gigabit IPSec-Compliant Implementations of Rijndael and Triple DES Using SLAAC-1V FPGA Accelerator Board. In: Proceedings of the Information Security Conference, pp. 220–234 (October 2001)

    Google Scholar 

  8. IEEE-SA Standards Board. IEEE 802.11iTM. IEEE Standard for Information Technology – Telecommunications and information exchange between systems – Local and metropolitan area networks – Specific requirements – Part 11: Wireless LAN Medium Access Control (MAC) and Physical Layer (PHY) specifications – Amendment 6: Medium Access Control (MAC) Security Enhancements. IEEE-SA Standards (2004)

    Google Scholar 

  9. Sáiz, P.: A model for establishing secure sessions at the link layer between endpoints in Ethernet networks. PhD thesis, Faculty of Engineeering. UPV/EHU (October 2007)

    Google Scholar 

  10. Hwang, D.D., Schaumont, P., Tiri, K., Verbauwhede, I.: Securing Embedded Systems. IEEE Security and Privacy 4(2), 40–49 (2006)

    Article  Google Scholar 

  11. Inc. Freescale Semiconductor. ColdFire Security: SEC and Hardware Encryption Acceleration Overview. Freescale Semiconductor Application Note 2788 (2003), http://www.freescale.com/files/32bit/doc/app_note/AN2788.pdf

  12. Martin, G., Chang, H. (eds.): Winning the SoC Revolution: Experiences in Real Design. Kluwer Academic Publishers, Massachusetts (2003)

    Google Scholar 

  13. Zorian, Y., Gupta, R.K.: Introducing Core-Based System Design. IEEE Design & Test of Computers 14(4), 15–25 (1997)

    Article  Google Scholar 

  14. Bergamaschi, R.A., Bhattacharya, S., Wagner, R., Fellenz, C., Muhlada, M.: Automating the Design of SOCs Using Cores. IEEE Design & Test of Computers 18(5), 32–45 (2001)

    Article  Google Scholar 

  15. OpenCores Comunity. OpenCores: Free open source IP Cores and Chip Design (2004), http://www.opencores.org

  16. Astarloa, A., Bidarte, U., Lázaro, J., Arias, J., Olaguenaga, E.: OSCRYB: Open Source CRYpto-Bridge for Secure Ethernet point-to-point Industrial Communications. In: Proceedings of the 33nd Annual Conference of the IEEE Industrial Electronics Society (IECON 2007) (November 2007)

    Google Scholar 

  17. Nguyen, K., Mohor, I., Markovic, T.: OpenCores Ethernet MAC 10/100 Mbps: Overview (2006), http://www.opencores.org/projects.cgi/web/ethmac/overview

  18. Silicore Corporation. Wishbone System-on-Chip (SoC) Interconnection Architecture for Portable IP Cores Revision: B.3 (September 2002), http://www.opencores.org

  19. Rudolf Usselmann. SoC Bus Review, http://www.opencores.org

  20. Chapman, K.: PicoBlaze 8-Bit Microcontroller for Virtex-E and Spartan II/IIE Devices. Xilinx Application Notes (February 2003), http://www.xilinx.com

  21. Xilinx Corp. Using Block SelectRAM+ Memory in Spartan II FPGAs. Xilinx Application Notes (December 2000), http://www.xilinx.com

  22. Daemen, J., Rijmen, V.: Rijndael: Algorithm Specification (2001), http://csrc.nist.gov/encryption/aes/rijndael/

  23. Astarloa, A., Sáiz, P., Lázaro, J., Jacob, E., Bidarte, U.: Multi-architectural 128 bit AES-CBC Core based on Open-Source Hardware AES Implementations for Secure Industrial Communications. In: Proceedings of the 10th International Conference on Communication Technology (ICCT2006), pp. 221–226 (November 2006)

    Google Scholar 

  24. Gaj, K., Chodowiec, P.: Comparison of the Hardware Performance of the AES Candidates Using Reconfigurable Hardware. In: Proceedings of The Third Advanced Encryption Standard Candidate Conference, pp. 40–54 (April 2000)

    Google Scholar 

  25. National Institute of Standards and Technology. Cryptographic Toolkit. Modes of Operations. Computer Security Resource Center (2005), http://csrc.nist.gov/CryptoToolkit/tkmodes.html

  26. Usselmann, R.: AES (Rijndael) IP Core (2002), http://www.opencores.org/projects.cgi/web/aes_core/overview

Download references

Author information

Authors and Affiliations

Authors

Editor information

Chunming Rong Martin Gilje Jaatun Frode Eika Sandnes Laurence T. Yang Jianhua Ma

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Astarloa, A., Bidarte, U., Jiménez, J., Lázaro, J., Martinez de Alegría, I. (2008). Secure Ethernet Point-to-Point Links for Autonomous Electronic Ballot Boxes. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_48

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69295-9_48

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69294-2

  • Online ISBN: 978-3-540-69295-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics