Security technologies and protocols in electronic and online voting systems

Online voting can be made secure through the use of technologies such as encryption, digital signatures and multi-factor authentication. In addition, secure coding practices, adoption of recognized standards, source code audits, and security testing are essential to protect the integrity of electronic voting systems. Continuous monitoring is critical to detect possible threats.

Security technologies online voting

There are security technologies and protocols that can be used in electronic and online voting systems to ensure the integrity, confidentiality and availability of the system and the data it processes. Here are some examples:


Encryption is a technique that can be used to protect sensitive data, such as voter information and election results, by converting it into an unreadable format. This can prevent anyone from gaining unauthorized access to the data.

Digital signatures

Digital signatures can be used to verify the authenticity of data, such as voter information and election results, by providing a unique identifier that can be used to confirm that the data has not been tampered with.

Multi-factor authentication

Multi-factor authentication can be used to ensure that only authorized users can access the electronic voting system. This can be achieved by requiring users to provide more than one form of identification, such as a password and a fingerprint.


Firewalls can be used to protect the electronic voting system from unauthorized access by blocking traffic from untrusted sources and monitoring incoming and outgoing network traffic.

Intrusion detection and prevention systems

Intrusion detection and prevention systems can be used to monitor the electronic voting system for unauthorized access and activities that could compromise the security of the system.

Secure coding practices

Secure coding practices are a set of techniques and guidelines used to develop cybersecurity software and systems with increased attention to vulnerabilities and potential threats.

The goal is to create robust and reliable code. In the context of electronic voting systems, secure coding practices are particularly important to preserve the integrity of the system and zero in on the risk of manipulation of election results.

There are several secure coding practices that can be used in electronic and online voting systems, including:

Adoption of established safety standards

Electronic voting systems should be developed using established and internationally recognized security standards, such as those developed by ISO or NIST.

Code verification

The source code of the electronic voting system should be verified by computer security experts so as to identify any vulnerabilities or security holes.

Use of secure programming techniques

Secure programming techniques, such as checking variable constraints or using hashing functions, can be used to minimize the possibility of programming errors.

Security Testing

The electronic voting system should undergo regular security testing to identify any vulnerabilities or flaws.

Continuous monitoring

Electronic voting systems should be constantly monitored for unauthorized access attempts or cyber attacks.