Skip to main content
U.S. flag

An official website of the United States government

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Secure .gov websites use HTTPS
A lock ( ) or https:// means you’ve safely connected to the .gov website. Share sensitive information only on official, secure websites.

Test Assertions for VVSG 1.1, Volume 1, Section 7.7.3, September 23, 2016

VVSG 1.1, Vol 1, Requirement 7.7.3: Protecting Transmitted Data

The transmitted data, especially via wireless communications, needs to be protected to ensure confidentiality and integrity. Examples of election information that needs to be protected include: ballot definitions, voting device counts, precinct counts, opening of poll signal, and closing of poll signal. Examples of other information that needs to be protected include: protocol messages, address or device identification information, and passwords.

Since radio frequency wireless signals radiate in all directions and pass through most construction material, anyone may easily receive the wireless signals. In contrast, infrared signals are line of sight and do not pass through most construction material. However, infrared signals can still be received by other devices that are in the line of sight. Similarly, wireless signals can be transmitted by others to create unwanted signals. Thus, encryption is required to protect the privacy and confidentiality of the voting information.

a.  All information transmitted via wireless communications shall be encrypted and authenticated--with the exception of wireless T-coil coupling--to protect against eavesdropping and data manipulation including modification, insertion, and deletion.

  1. Cryptography used for encryption and authentication shall use NIST approved algorithms with security strength of at least 112 bits. Message Authentication Code (MAC) keys shall have a security strength of at least 112 bits.
  2. The cryptographic modules used shall comply with FIPS 140-2, Security Requirements for Cryptographic Modules.

b.  The capability to transmit non-encrypted and non-authenticated information via wireless communications shall not exist.

c.  If audible wireless communication is used, and the receiver of the wireless transmission is the human ear, then the information shall not be encrypted.

DISCUSSION: 7.7.3(c) specifically covers wireless T-Coil coupling for assistive devices used by people who are hard of hearing.

 

Test Assertions

TA773a-1:  IF information is transmitted via wireless communications THEN all that information, except wireless T-coil coupling, SHALL be encrypted in order to protect against eavesdropping.

TA773a-2:  IF information is transmitted via wireless communications THEN all that information, except wireless T-coil coupling, SHALL be encrypted in order to protect against data manipulation including modification, insertion, and deletion.

TA773a-3:  IF information is transmitted via wireless communications THEN all that information, except wireless T-coil coupling, SHALL be authenticated in order to protect against eavesdropping.

TA773a-4:  IF information is transmitted via wireless communications THEN all that information, except wireless T-coil coupling, SHALL be authenticated in order to protect against data manipulation including modification, insertion, and deletion.

TA773ai-1:  Cryptography used for encryption SHALL use NIST approved algorithms with security strength of at least 112 bits.

TA773ai-2:  Cryptography used for authentication SHALL use NIST approved algorithms with security strength of at least 112 bits.

TA773ai-3:  Message Authentication Code (MAC) keys SHALL have a security strength of at least 112 bits.

TA773aii-1:  The cryptographic modules used SHALL be certified by Cryptographic Module Validation Program (CMVP).

TA773b-1: IF the transmission is via wireless communications, THEN voting systems SHALL ONLY have the capability to transmit information that is encrypted and information that is authenticated.

TA773c-1:  IF audible wireless communication is used AND IF the receiver of the wireless transmission is the human ear THEN the information SHALL NOT be encrypted.

 

Created September 22, 2016, Updated October 19, 2016