US Election Assistance Commission - Voluntary Voting System Guidelines Vote
EAC Home
Introduction
View Guidelines
View Comments
Glossary

View Comments

Section CommentsGeneral CommentsGlossary Comments
 
Name :   Jordi Puiggali
Organization :   Scytl Secure Electronic Voting
Post Date :   9/9/2005

Section Comments
Section :  A1D
Page no. :  
Line no.:  
Comment :  [Volume I, Appendix D]
Comments on Cryptographic Characteristics
2.1.10 The cryptographic software in independent verification voting systems is approved by the
U.S. Government's Cryptographic Module Validation Program (CMVP) as applicable.
We strongly believe that cryptographic algorithms must be publicly available and checked by the
cryptographic community. We must discourage the use of proprietary algorithms that are kept
secret to protect its security. As a result, we suggest to expand the requirement as follows:
2.1.10 The cryptographic software in independent verification voting systems is approved by the
U.S. Government's Cryptographic Module Validation Program (CMVP) as applicable.
Cryptographic algorithms shall be publicly available and its security checked by the cryptographic
community.