Proceedings of the Institute for System Programming of the RAS
RUS  ENG    JOURNALS   PEOPLE   ORGANISATIONS   CONFERENCES   SEMINARS   VIDEO LIBRARY   PACKAGE AMSBIB  
General information
Latest issue
Archive

Search papers
Search references

RSS
Latest issue
Current issues
Archive issues
What is RSS



Proceedings of ISP RAS:
Year:
Volume:
Issue:
Page:
Find






Personal entry:
Login:
Password:
Save password
Enter
Forgotten password?
Register


Proceedings of the Institute for System Programming of the RAS, 2018, Volume 30, Issue 4, Pages 155–168
DOI: https://doi.org/10.15514/ISPRAS-2018-30(4)-10
(Mi tisp353)
 

This article is cited in 1 scientific paper (total in 1 paper)

Registration protocol security analysis of the electronic voting system based on blinded intermediaries using the Avispa tool

I. A. Pisarev, L. K. Babenko

Southern Federal University
References:
Abstract: Electronic voting systems are a future alternative to traditional methods of voting. It is important to verify the main algorithms on which system security is based. This paper analyzes the security of the cryptographic protocol at the registration stage, which is used in the electronic voting system based on blind intermediaries created by the authors. The registration protocol is described, the messages transmitted between the parties are shown and their content is explained. The Dolev-Yao threat model is used during protocols modeling. The Avispa tool is used for analyzing the security of the selected protocol. The protocol is described in CAS+ and subsequently translated into the HLPSL (High-Level Protocol Specification Language) special language with which Avispa work. The description of the protocol includes roles, data, encryption keys, the order of transmitted messages between parties, parties’ knowledge include attacker, the purpose of verification. The verification goals of the cryptographic protocol for resistance to attacks on authentication, secrecy and replay attacks are set. The data that a potential attacker may possess is detected. The security analysis of the registration protocol was made. The analysis showed that the objectives of the audit were put forward. A detailed diagram of the messages transmission and their contents is displayed in the presence of an attacker who performs a MITM-attack (Man in the middle). The effectiveness of protocol protection from the attacker actions is shown.
Keywords: e-voting, cryptographic protocols, cryptographic security, cryptographic protocols security verification.
Funding agency Grant number
Ministry of Education and Science of the Russian Federation 2.6264.2017/8.9
The work was supported by the Ministry of Education and Science of the Russian Federation grant No 2.6264.2017/8.9.
Bibliographic databases:
Document Type: Article
Language: English
Citation: I. A. Pisarev, L. K. Babenko, “Registration protocol security analysis of the electronic voting system based on blinded intermediaries using the Avispa tool”, Proceedings of ISP RAS, 30:4 (2018), 155–168
Citation in format AMSBIB
\Bibitem{PisBab18}
\by I.~A.~Pisarev, L.~K.~Babenko
\paper Registration protocol security analysis of the electronic voting system based on blinded intermediaries using the Avispa tool
\jour Proceedings of ISP RAS
\yr 2018
\vol 30
\issue 4
\pages 155--168
\mathnet{http://mi.mathnet.ru/tisp353}
\crossref{https://doi.org/10.15514/ISPRAS-2018-30(4)-10}
\elib{https://elibrary.ru/item.asp?id=35544597}
Linking options:
  • https://www.mathnet.ru/eng/tisp353
  • https://www.mathnet.ru/eng/tisp/v30/i4/p155
  • This publication is cited in the following 1 articles:
    Citing articles in Google Scholar: Russian citations, English citations
    Related articles in Google Scholar: Russian articles, English articles
    Proceedings of the Institute for System Programming of the RAS
    Statistics & downloads:
    Abstract page:181
    Full-text PDF :80
    References:19
     
      Contact us:
     Terms of Use  Registration to the website  Logotypes © Steklov Mathematical Institute RAS, 2024