Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier
Title | Security Analysis of the Electronic Voting Protocol Based on Blind Intermediaries Using the SPIN Verifier |
Publication Type | Conference Paper |
Year of Publication | 2018 |
Authors | Babenko, Liudmila, Pisarev, Ilya |
Conference Name | 2018 International Conference on Cyber-Enabled Distributed Computing and Knowledge Discovery (CyberC) |
Date Published | Oct. 2018 |
Publisher | IEEE |
ISBN Number | 978-1-7281-0974-9 |
Keywords | authentication, Collaboration, cryptographic protocol, cryptographic protocols, cybersecurity, data substitution, E-Government, e-voting, Electronic voting, electronic voting protocol, electronic voting system, Electronic voting systems, formal verification, government data processing, linear temporal logic, LTL, man in the middle attack, MITM, model checking, policy-based governance, Promela language, protocol security, pubcrawl, resilience, Resiliency, security analysis, SPIN, SPIN formal verifier, SPIN verifier, Tools, verification |
Abstract | Cryptographic protocols are the basis for the security of any protected system, including the electronic voting system. One of the most effective ways to analyze protocol security is to use verifiers. In this paper, the formal verifier SPIN was used to analyze the security of the cryptographic protocol for e-voting, which is based on model checking using linear temporal logic (LTL). The cryptographic protocol of electronic voting is described. The main structural units of the Promela language used for simulation in the SPIN verifier are described. The model of the electronic voting protocol in the language Promela is given. The interacting parties, transferred data, the order of the messages transmitted between the parties are described. Security of the cryptographic protocol using the SPIN tool is verified. The simulation of the protocol with active intruder using the man in the middle attack (MITM) to substitute data is made. In the simulation results it is established that the protocol correctly handles the case of an active attack on the parties' authentication. |
URL | https://ieeexplore.ieee.org/document/8644703 |
DOI | 10.1109/CyberC.2018.00019 |
Citation Key | babenko_security_2018 |
- LTL
- verification
- tools
- SPIN verifier
- SPIN formal verifier
- SPIN
- Security analysis
- Resiliency
- resilience
- pubcrawl
- Protocol Security
- Promela language
- policy-based governance
- model checking
- MITM
- man in the middle attack
- authentication
- Linear Temporal Logic
- government data processing
- formal verification
- Electronic voting systems
- electronic voting system
- electronic voting protocol
- electronic voting
- e-voting
- E-Government
- data substitution
- Cybersecurity
- Cryptographic Protocols
- cryptographic protocol
- collaboration