|

 
|
| | Name : | Jordi Puiggali | Organization : | Scytl Secure Electronic Voting | Post Date : | 9/9/2005 |
| Section : | A1D | Page no. : | | Line no.: | | Comment : | [Volume I, Appendix D]
Comments on Cryptographic Characteristics
2.1.10 The cryptographic software in independent verification voting systems is approved by the
U.S. Government's Cryptographic Module Validation Program (CMVP) as applicable.
We strongly believe that cryptographic algorithms must be publicly available and checked by the
cryptographic community. We must discourage the use of proprietary algorithms that are kept
secret to protect its security. As a result, we suggest to expand the requirement as follows:
2.1.10 The cryptographic software in independent verification voting systems is approved by the
U.S. Government's Cryptographic Module Validation Program (CMVP) as applicable.
Cryptographic algorithms shall be publicly available and its security checked by the cryptographic
community. | |
|
|