An Analysis of the Wombat Voting System Model

advertisement
An Analysis of the
Wombat Voting
System Model
By Eitan Grundland
The System Goals
●
●
●
Integrity
Privacy
Transparency
Why Change to Digital?
●
Computers are faster!
●
Computers are more accurate!
●
As days go by, digital interfaces are more intuitive
to the public!
The evolution in inevitable!
From Paper to Digital
From Paper to Digital
From Paper to Digital
From Paper to Digital
From Paper to Digital
Security
Components
Overview
Security Components
A weak identification procedure can
compromise the entire election
process.
Security Components
•
•
•
•
Live CD OS
Encryption
Randomness Generation
Zero Knowledge 1 of L
Security Components
• Voter's Receipt
• Digital Signatures
Security Components
• Paper Ballots
• Serial Number
Security Components
• Threshold Encryption
• Hash for Tallying Verification
Security Components
Audit Ballot
Security Components
• Mixnet
• Mixnet Zero Knowledge
The
Participating
Parties
The Participating Parties
●
Ballot Stuffing
●
Voter Exposure
●
Authentication Disabling
●
Smart Card Forgery
The Participating Parties
Actions That Pose No Threat When Carried Out by
a Single Party
The Participating Parties
●
False Results Publishing
The Participating Parties
●
False Accusation
The Participating Parties
●
Registration Frauds
The Participating Parties
●
Vote Buyers Motivation
●
Voter Exposure
The Participating Parties
Actions That Pose No Threat When Carried Out by
a Single Party
The Participating Parties
●
●
●
Voter Exposure
Printing Subliminal
Channel
Booth Denial of Service
The Participating Parties
●
Partial Voter Exposure
The Participating Parties
●
Booth OS Built-in
Backdoor
●
Altering Ballots
●
Subliminal Channel
●
Printing Subliminal
Channel
The Participating Parties
●
Collecting External
Information
Threats
of Attackers
Collaboration
Attackers Collaboration
Registration Frauds
Attackers Collaboration
Repeating
Attackers Collaboration
Booth's OS CD
Manufacturers Capabilities
Identity
Attackers Collaboration
●
●
Partial Exposure Voter
Voter Exposure by the
Ability to Decrypt the
Votes
Attackers Collaboration
Voter Exposure by the
Ability to Decrypt the Votes
Attackers Collaboration
Ballot Stuffing
Attackers Collaboration
Voter Exposure
Attackers Collaboration
Chain Voting
Attackers Collaboration
Chain Voting
Attackers Collaboration
Voter Exposure by the
Ability to Decrypt the Votes
Attackers Collaboration
Subliminal Channel
Attackers Collaboration
Voter Exposure by the
Ability to Decrypt the Votes
Conclusion
Identification Process
• People can vote anywhere
• Biometric identification
• Limit each scanned vote
to a single identification
by software.
Live OS CD
The CD should be
digitally signed
Booth Machine
The booth machine
should be checked for
suspicious components
Physical Stamp
Each stamp should
contain poll's digital
signature
Bulletin Board
A digitally signed
list of all the cipher
votes
Booth Machine Auditing
An audit every two
hours in each
booth
Ballot Scanning Authentications Auditing
A special
"authentication audit
ballot"
Conclusion
An audit OCR
program
Download