an analysis of the wombat voting system model

51
An Analysis of the Wombat Voting System Model By Eitan Grundland Election s Security Democrac y Electron i cs Transpare ncy Hacking

Upload: ulmer

Post on 24-Feb-2016

47 views

Category:

Documents


0 download

DESCRIPTION

An Analysis of the Wombat Voting System Model. Security. Hacking. Electronics. Elections. Transparency. Democracy. By Eitan Grundland. The System Goals. Integrity Privacy Transparency. Why Change to Digital ?. Computers are faster! Computers are more accurate! - PowerPoint PPT Presentation

TRANSCRIPT

Page 1: An Analysis of the Wombat Voting System Model

An Analysis of the Wombat Voting System Model

By Eitan Grundland

ElectionsSecurity

Democracy

ElectronicsTranspare

ncy

Hacking

Page 2: An Analysis of the Wombat Voting System Model

The System Goals

● Integrity

● Privacy

● Transparency

Page 3: An Analysis of the Wombat Voting System Model

Why Change to Digital?

● Computers are faster!● Computers are more accurate!● As days go by, digital interfaces are more

intuitive to the public!

The evolution in inevitable!

Page 4: An Analysis of the Wombat Voting System Model

From Paper to Digital

Page 5: An Analysis of the Wombat Voting System Model

From Paper to Digital

Page 6: An Analysis of the Wombat Voting System Model

From Paper to Digital

Page 7: An Analysis of the Wombat Voting System Model

From Paper to Digital

Page 8: An Analysis of the Wombat Voting System Model

From Paper to Digital

Page 9: An Analysis of the Wombat Voting System Model

SecurityComponentsOverview

Page 10: An Analysis of the Wombat Voting System Model

Security Components

A weak identification procedure can compromise the entire election process.

Page 11: An Analysis of the Wombat Voting System Model

Security Components

• Live CD OS• Encryption• Randomness Generation• Zero Knowledge 1 of L

Page 12: An Analysis of the Wombat Voting System Model

Security Components

• Voter's Receipt• Digital Signatures

Page 13: An Analysis of the Wombat Voting System Model

Security Components

• Paper Ballots• Serial Number

Page 14: An Analysis of the Wombat Voting System Model

Security Components

• Threshold Encryption• Hash for Tallying Verification

Page 15: An Analysis of the Wombat Voting System Model

Audit Ballot

Security Components

Page 16: An Analysis of the Wombat Voting System Model

Security Components

• Mixnet• Mixnet Zero

Knowledge

Page 17: An Analysis of the Wombat Voting System Model

TheParticipating

Parties

Page 18: An Analysis of the Wombat Voting System Model

The Participating Parties

Polling Technicians and Staff 1

● Ballot Stuffing● Voter Exposure● Authentication Disabling● Smart Card Forgery

Page 19: An Analysis of the Wombat Voting System Model

The Participating Parties

Actions That Pose No Threat When Carried Out by a Single Party

Supervising Authorities and Candidates System Administrators

2

Polling Technicians and Staff 1

Page 20: An Analysis of the Wombat Voting System Model

The Participating Parties

Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

● False Results Publishing

Bulletin Board Administrators 3

Page 21: An Analysis of the Wombat Voting System Model

The Participating Parties

Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

● False Accusation

Voters 4

Page 22: An Analysis of the Wombat Voting System Model

The Participating Parties

Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4● Registration Frauds

Impostors 5

Page 23: An Analysis of the Wombat Voting System Model

The Participating Parties

Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5

● Vote Buyers Motivation● Voter Exposure

Vote Buyers/ Coercers 6

Page 24: An Analysis of the Wombat Voting System Model

The Participating Parties

Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6

Actions That Pose No Threat When Carried Out by a Single Party

Smart Card Manufacturers 7

Page 25: An Analysis of the Wombat Voting System Model

The Participating Parties

Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7

● Voter Exposure● Printing Subliminal

Channel● Booth Denial of Service

Printer Manufacturer 8

Page 26: An Analysis of the Wombat Voting System Model

The Participating Parties

Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8

● Partial Voter Exposure

Scanner Manufacturer 9

Page 27: An Analysis of the Wombat Voting System Model

The Participating Parties

Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9

● Booth OS Built-in Backdoor

● Altering Ballots● Subliminal Channel● Printing Subliminal

ChannelLinux OS CD provider 10

Page 28: An Analysis of the Wombat Voting System Model

The Participating Parties

Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9Linux OS CD provider 1

0

● Collecting External Information

External Attackers 11

Page 29: An Analysis of the Wombat Voting System Model

Threats of Attackers Collaboration

Page 30: An Analysis of the Wombat Voting System Model

Attackers Collaboration Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9Linux OS CD provider 1

0External Attackers 1

1

Registration Frauds

Page 31: An Analysis of the Wombat Voting System Model

Attackers Collaboration Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9Linux OS CD provider 1

0External Attackers 1

1

Repeating

Page 32: An Analysis of the Wombat Voting System Model

Attackers Collaboration Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9Linux OS CD provider 1

0External Attackers 1

1

Booth's OS CD Manufacturers Capabilities Identity

Page 33: An Analysis of the Wombat Voting System Model

Attackers Collaboration Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9Linux OS CD provider 1

0External Attackers 1

1

● Partial Exposure Voter● Voter Exposure by the

Ability to Decrypt the Votes

Page 34: An Analysis of the Wombat Voting System Model

Attackers Collaboration Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9Linux OS CD provider 1

0External Attackers 1

1

Voter Exposure by the Ability to Decrypt the Votes

Page 35: An Analysis of the Wombat Voting System Model

Attackers Collaboration Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9Linux OS CD provider 1

0External Attackers 1

1

Ballot Stuffing

Page 36: An Analysis of the Wombat Voting System Model

Attackers Collaboration Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9Linux OS CD provider 1

0External Attackers 1

1

Voter Exposure

Page 37: An Analysis of the Wombat Voting System Model

Attackers Collaboration Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9Linux OS CD provider 1

0External Attackers 1

1

Chain Voting

Page 38: An Analysis of the Wombat Voting System Model

Attackers Collaboration Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9Linux OS CD provider 1

0External Attackers 1

1

Chain Voting

Page 39: An Analysis of the Wombat Voting System Model

Attackers Collaboration Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9Linux OS CD provider 1

0External Attackers 1

1

Voter Exposure by the Ability to Decrypt the Votes

Page 40: An Analysis of the Wombat Voting System Model

Attackers Collaboration Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9Linux OS CD provider 1

0External Attackers 1

1

Subliminal Channel

Page 41: An Analysis of the Wombat Voting System Model

Attackers Collaboration Polling Technicians and Staff 1Supervising Authorities and Candidates System Administrators

2

Bulletin Board Administrators 3

Voters 4Impostors 5Vote Buyers/ Coercers 6Smart Card Manufacturers 7Printer Manufacturer 8Scanner Manufacturer 9Linux OS CD provider 1

0External Attackers 1

1

Voter Exposure by the Ability to Decrypt the Votes

Page 42: An Analysis of the Wombat Voting System Model

Conclusion

Page 43: An Analysis of the Wombat Voting System Model

Identification Process

• People can vote anywhere

• Biometric identification

• Limit each scanned vote to a single identification by software.

Page 44: An Analysis of the Wombat Voting System Model

Live OS CD

The CD should be digitally signed

Page 45: An Analysis of the Wombat Voting System Model

Booth Machine

The booth machine should be checked for suspicious components

Page 46: An Analysis of the Wombat Voting System Model

Physical Stamp

Each stamp should contain poll's digital signature

Page 47: An Analysis of the Wombat Voting System Model

Bulletin Board

A digitally signed list of all the cipher votes

Page 48: An Analysis of the Wombat Voting System Model

Booth Machine Auditing

An audit every two hours in each booth

Page 49: An Analysis of the Wombat Voting System Model

Ballot Scanning Authentications Auditing

A special "authentication audit ballot"

Page 50: An Analysis of the Wombat Voting System Model

Conclusion

An audit OCR program

Page 51: An Analysis of the Wombat Voting System Model

TheEnd