Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Draft Test Assertions for VVSG 1.0 Section 7.7.3 (Tabular Format), August 2015

Summary Tabular Format

Requirement

Assertion(s)

VVSG 1.0 Requirement 7.7.3:

The transmitted data, especially via wireless communications, needs to be protected to ensure confidentiality and integrity. Examples of election information that needs to be protected include: ballot definitions, voting device counts, precinct counts, opening of poll signal, and closing of poll signal. Examples of other information that needs to be protected include: protocol messages, address or device identification information, and passwords. Since radio frequency wireless signals radiate in all directions and pass through most construction material, anyone may easily receive the wireless signals. In contrast, infrared signals are line of sight and do not pass through most construction material. However, infrared signals can still be received by other devices that are in the line of sight. Similarly, wireless signals can be transmitted by others to create unwanted signals. Thus, encryption is required to protect the privacy and confidentiality of the voting information.

a. All information transmitted via wireless communications shall be encrypted and authenticated--with the exception of wireless T-coil coupling--to protect against eavesdropping and data manipulation including modification, insertion, and deletion.
i. The encryption shall be as defined in Federal Information Processing Standards (FIPS) 197, "Advanced Encryption Standard (AES)."

ii. The cryptographic modules used shall comply with FIPS 140-2, Security Requirements for Cryptographic Modules.

b. The capability to transmit non-encrypted and non-authenticated information via wireless communications shall not exist.

c. If audible wireless communication is used, and the receiver of the wireless transmission is the human ear, then the information shall not be encrypted.

Discussion: This specifically covers wireless T-Coil coupling for assistive devices used by people who are hard of hearing.

TA773a-1: IF information is transmitted via wireless communications THEN all that information, except wireless T-coil coupling, SHALL be encrypted in order to protect against eavesdropping.

 

TA773a-2: IF information is transmitted via wireless communications THEN all that information, except wireless T-coil coupling, SHALL be encrypted in order to protect against data manipulation including modification, insertion, and deletion.

 

TA773a-3: IF information is transmitted via wireless communications THEN all that information, except wireless T-coil coupling, SHALL be authenticated in order to protect against eavesdropping.

 

TA773a-4: IF information is transmitted via wireless communications THEN all that information, except wireless T-coil coupling, SHALL be authenticated in order to protect against data manipulation including modification, insertion, and deletion.

 

TA773a-5: Cryptography used SHALL use NIST approved algorithms with security strength of at least 112 bits.

 

TA773ai-1: The encryption SHALL be as defined in Federal Information Processing Standards (FIPS) 197, "Advanced Encryption Standard (AES)."

 

TA773ai-2: Message Authentication Code (MAC) keys SHALL have a security strength of at least 112 bits.

 

TA773aii-1: The cryptographic modules used SHALL comply with FIPS 140-2, Security Requirements for Cryptographic Modules.

 

TA773b-1: IF the transmission is via wirelesscommunications, THEN Voting Systems SHALL ONLY have the capability to transmitencrypted and authenticated information.

 

TA773c-1: IF audible wireless communication is used AND IF the receiver of the wireless transmission is the human ear THEN the information SHALL NOT be encrypted.

 

 

Created August 28, 2015, Updated June 2, 2021