8 |
8 |
9 In security engineering, there are many counter-intuitive |
9 In security engineering, there are many counter-intuitive |
10 phenomena: for example I am happy (more or less) to use online |
10 phenomena: for example I am happy (more or less) to use online |
11 banking every day, where if something goes wrong, I can |
11 banking every day, where if something goes wrong, I can |
12 potentially lose a lot of money, but I am staunchly against |
12 potentially lose a lot of money, but I am staunchly against |
13 using electronic voting (lets call it e-voting for short). |
13 using electronic voting (let's call it e-voting for short). |
14 E-voting is an idea that is nowadays often promoted in order |
14 E-voting is an idea that is nowadays often promoted in order |
15 to counter low turnouts in elections\footnote{In my last local |
15 to counter low turnouts in elections\footnote{In my last local |
16 election where I was eligible to vote only 48\% of the |
16 election where I was eligible to vote only 48\% of the |
17 population have cast their ballot. I was, I shamefully admit, |
17 population have cast their ballot. I was, I shamefully admit, |
18 one of the non-voters.} and generally sounds like a good idea. |
18 one of the non-voters.} and generally sounds like a good idea. |
87 always have an error rate: people after several hours |
90 always have an error rate: people after several hours |
88 looking at ballots will inevitably miscount votes. But |
91 looking at ballots will inevitably miscount votes. But |
89 what should be ensured is that the error rate does not |
92 what should be ensured is that the error rate does not |
90 change the outcome of the election. Of course if |
93 change the outcome of the election. Of course if |
91 elections continue to be on knives edges we need to |
94 elections continue to be on knives edges we need to |
92 ensure that we have a rather small error rate. |
95 strive for rather small error rates. |
93 |
96 |
94 \item There might be gigantic sums at stake and need to be |
97 \item There might be gigantic sums at stake and need to be |
95 defended against. The problem with this is that if |
98 defended against. The problem with this is that if |
96 the incentives are great and enough resources are |
99 the incentives are great and enough resources are |
97 available, then maybe it is feasible to mount a DoS |
100 available, then maybe it is feasible to mount a DoS |
98 attack against voting server and by bringing the |
101 attack against the voting server and by bringing the |
99 system to its knees, change the outcome of an |
102 system to its knees, change the outcome of an |
100 election. Not to mention to hack the complete |
103 election. Not to mention to hack the complete |
101 system with malware and change votes undetectably. |
104 system with malware and change votes undetectably. |
102 \end{itemize} |
105 \end{itemize} |
103 |
106 |
153 \end{center} |
156 \end{center} |
154 |
157 |
155 \noindent If we had ballots with complete voter |
158 \noindent If we had ballots with complete voter |
156 identification, then we can improve integrity because we can |
159 identification, then we can improve integrity because we can |
157 trace back the votes to the voters. This would be good when |
160 trace back the votes to the voters. This would be good when |
158 verifying the results or recounting. But such an |
161 verifying the results or when recounting. But such an |
159 identification would violate ballot secrecy (you can prove to |
162 identification would violate ballot secrecy (you can prove to |
160 somebody else how you voted). In contrast, if we remove all |
163 somebody else how you voted). In contrast, if we remove all |
161 identification for ensuring ballot secrecy, then we have to |
164 identification for ensuring ballot secrecy, then we have to |
162 ensure that no ``vote-stuffing'' occurs. Similarly, if we |
165 ensure that no ``vote-stuffing'' occurs. Similarly, if we |
163 improve authentication by requiring a to be present at the |
166 improve authentication by requiring to be present at the |
164 polling station with an ID card, then we exclude absentee |
167 polling station with an ID card, then we exclude absentee |
165 voting. |
168 voting. |
166 |
169 |
167 To tackle the problem of e-voting, we should first have a look |
170 To tackle the problem of e-voting, we should first have a look |
168 into the history of voting and how paper-based ballots |
171 into the history of voting and how paper-based ballots |
169 evolved. Because also good-old-fashioned paper ballot voting |
172 evolved. Because also good-old-fashioned paper ballot voting |
170 is not entirely trivial and immune from being hacked. We know |
173 is not entirely trivial and immune from being hacked. We know |
171 for sure that elections were held in Athens as early as 600 |
174 for sure that elections were held in Athens as early as 600 |
172 BC, but might even date to the time of Mesopotamia and also in |
175 BC, but might even date to the time of Mesopotamia and also in |
173 India some kind of ``republics'' might have existed before the |
176 India some kind of republics might have existed before the |
174 Alexander the Great invaded it. Have a look at Wikipedia about |
177 Alexander the Great invaded it. Have a look at Wikipedia about |
175 the history of democracy for more information. These elections |
178 the history of democracy for more information. These elections |
176 were mainly based on voting by show of hands. While this |
179 were mainly based on voting by show of hands. While this |
177 method of voting satisfies many of the requirements stipulated |
180 method of voting satisfies many of the requirements stipulated |
178 above, the main problem with hand voting is that it does not |
181 above, the main problem with hand voting is that it does not |
179 guaranty ballot secrecy. As far as I know the old Greeks and |
182 guaranty ballot secrecy. As far as I know the old Greeks and |
180 Romans did not perceive this as a problem, but the result was |
183 Romans did not perceive this as a problem, but the result was |
181 that their elections favoured rich, famous people who had |
184 that their elections favoured rich, famous people who had |
182 enough resources to swing votes. Even using small coloured |
185 enough resources to swing votes. Even using small coloured |
183 stones did not really mitigate the problem with ballot |
186 stones, which were also used at that time, did not really |
184 secrecy. The problem of authorisation was solved by friends or |
187 mitigate the problem with ballot secrecy. The problem of |
185 neighbours vouching for you to prove you are eligible to vote |
188 authorisation was solved by friends or neighbours vouching for |
186 (there were no ID cards in ancient Greece and Rome). |
189 you to prove you are eligible to vote (there were no ID cards |
|
190 in ancient Greece and Rome). |
187 |
191 |
188 Starting with the French Revolution and the US constitution, |
192 Starting with the French Revolution and the US constitution, |
189 people started to value a more egalitarian approach to voting |
193 people began to value a more egalitarian approach to voting |
190 and electing officials. This was also the time where paper |
194 and electing officials. This was also the time where paper |
191 ballots started to become the prevailing form of casting |
195 ballots started to become the prevailing form of casting |
192 votes. While more resistant against voter intimidation, paper |
196 votes. While more resistant against voter intimidation, paper |
193 ballots need a number of security mechanisms to avoid fraud. |
197 ballots need a number of security mechanisms to avoid fraud. |
194 For example you need voting booths to fill out the ballot in |
198 For example you need voting booths for being able to fill out |
195 secret. Also transparent ballot boxes are often used in order |
199 the ballot in secret. Also transparent ballot boxes are often |
196 to easily detect and prevent vote stuffing (prefilling the |
200 used in order to easily detect and prevent vote stuffing |
197 ballot box with false votes). |
201 (prefilling the ballot box with false votes). |
198 |
202 |
199 \begin{center} |
203 \begin{center} |
200 \includegraphics[scale=2.5]{../pics/ballotbox.jpg} |
204 \includegraphics[scale=2.5]{../pics/ballotbox.jpg} |
201 \end{center} |
205 \end{center} |
202 |
206 |
203 \noindent Another security mechanism is to guard the ballot |
207 \noindent Another security mechanism is to guard the ballot |
204 box against any tampering during the election until counting. |
208 box against any tampering during the election until counting. |
205 The counting needs to be done by a team potentially involving |
209 The counting needs to be done by a team potentially involving |
206 also independent observers. One interesting attack against |
210 also independent observers. |
207 completely anonymous paper ballots is called \emph{chain vote |
211 |
208 attack}. It works if the paper ballots are given out to each |
212 One interesting attack against completely anonymous paper |
209 voter at the polling station. Then an attacker can give the |
213 ballots is called \emph{chain vote attack}. It works if the |
210 prefilled ballot to a voter. The voter uses this prefilled |
214 paper ballots are given out to each voter at the polling |
211 ballot to cast the vote, and then returns the empty ballot |
215 station. Then an attacker can give the prefilled ballot to a |
212 back to the attacker who now compensates the voter. The blank |
216 voter. The voter uses this prefilled ballot to cast the vote, |
213 ballot can be reused for the next voter. |
217 and then returns the empty ballot paper back to the attacker who now |
214 |
218 compensates the voter. The blank ballot can be reused for the |
215 The point is that paper ballots have evolved over some time |
219 next voter. |
|
220 |
|
221 To sum up, the point is that paper ballots have evolved over some time |
216 and no single best method has emerged for preventing fraud. |
222 and no single best method has emerged for preventing fraud. |
217 But the involved technology is well understood in order to |
223 But the involved technology is well understood in order to |
218 provide good enough security with paper ballots. |
224 provide good enough security with paper ballots. |
219 |
225 |
220 \subsection*{E-Voting} |
226 \subsection*{E-Voting} |
227 provide at least the same security, privacy and transparency |
233 provide at least the same security, privacy and transparency |
228 as the system it replaces.'' |
234 as the system it replaces.'' |
229 \end{quote} |
235 \end{quote} |
230 |
236 |
231 \noindent Whenever people argue in favour of e-voting they |
237 \noindent Whenever people argue in favour of e-voting they |
232 seem to be ignore this basic premise.\bigskip |
238 seem to be ignoring this basic premise.\bigskip |
233 |
239 |
234 \noindent After the debacle of the Florida presidential |
240 \noindent After the debacle of the Florida presidential |
235 election in 2000, many counties used Direct-Recording |
241 election in 2000, many voting precincts in the US used |
236 Electronic voting machines (DREs) or optical scan machines. |
242 Direct-Recording Electronic voting machines (DREs) or optical |
237 One popular model of DRE was sold by the company called |
243 scan machines. One popular model of DREs was sold by a |
238 Diebold. In hindsight they were a complete disaster: the |
244 company called Diebold. In hindsight they were a complete |
239 products were inferior and the company incompetent. Direct |
245 disaster: the products were inadequate and the company |
240 recording meant that there was no paper trail, the votes were |
246 incompetent. Direct recording meant that there was no paper |
241 directly recorded on memory cards. Thus the voters had no |
247 trail, the votes were directly recorded on memory cards. Thus |
242 visible assurance whether the votes were correctly cast. The |
248 the voters had no visible assurance whether the votes were |
243 machines behind these DREs were ``normal'' windows computers, |
249 correctly cast. Even if there is a printout provided; |
244 which could be used for anything, for example for changing |
250 it does not give any guaranty about what is recorded on |
245 votes. Why did nobody at Diebold think of that? That this was |
251 the memory card. |
246 eventually done undetectably is the result of the |
252 |
247 determination of ethical hackers like Alex Halderman. His |
253 The machines behind these DREs were ``normal'' windows |
248 group thoroughly hacked them showing that election fraud is |
254 computers, which could be used for anything, for example for |
249 easily possible. They managed to write a virus that infected |
255 changing votes. Why did nobody at Diebold think of that? I |
250 the whole system by having only access to a single machine. |
256 have no idea. But that this was eventually done undetectably |
|
257 is the result of the determination of ethical hackers like |
|
258 Alex Halderman. His group thoroughly hacked Diebold's DREs |
|
259 showing that election fraud with them is easily possible. They |
|
260 even managed to write a virus that infected the whole system |
|
261 by having only access to a single machine. |
251 |
262 |
252 \begin{figure}[t] |
263 \begin{figure}[t] |
253 \begin{center} |
264 \begin{center} |
254 \begin{tabular}{c} |
265 \begin{tabular}{c} |
255 \includegraphics[scale=0.45]{../pics/dre1.jpg}\; |
266 \includegraphics[scale=0.45]{../pics/dre1.jpg}\; |
260 \caption{Direct-Recording Electronic voting machines above; |
271 \caption{Direct-Recording Electronic voting machines above; |
261 an optical scan machine below.\label{machines}} |
272 an optical scan machine below.\label{machines}} |
262 \end{figure} |
273 \end{figure} |
263 |
274 |
264 What made matters worse was that Diebold tried to hide their |
275 What made matters worse was that Diebold tried to hide their |
265 incompetency and inferiority of their products, by requiring |
276 incompetency and the inferiority of their products, by |
266 that election counties must not give the machines up for |
277 requiring that election counties must not give the machines up |
267 independent review. They also kept their source secret. |
278 for independent review. They also kept their source secret. |
268 This meant Halderman and his group had to obtain a machine |
279 This meant Halderman and his group had to obtain a machine not |
269 not in the official channels. Then they had to reverse |
280 through the official channels. They then had to reverse |
270 engineer the source code in order to design their attack. |
281 engineer the source code in order to design their attack. What |
271 What this all showed is that a shady security design is no |
282 this all showed is that a shady security design is no match to |
272 match to a determined hacker. |
283 a determined hacker. |
273 |
284 |
274 Apart from the obvious failings (for example no papertrail), |
285 Apart from the obvious failings (for example no papertrail), |
275 this story also told another side. While a paper ballot box |
286 this story also told another side. While a paper ballot box |
276 need to be kept secure from the beginning of the election |
287 need to be kept secure from the beginning of the election |
277 (when it needs to be ensured it is empty) until the end of the |
288 (when it needs to be ensured it is empty) until the end of the |
278 day, electronic voting machines need to be kept secure the |
289 day, electronic voting machines need to be kept secure the |
279 whole year. The reason is of course one cannot see whether |
290 whole year. The reason is of course that one cannot see |
280 somebody has tampered with the program a computer is running. |
291 whether somebody has tampered with the program a computer is |
281 Such a 24/7 security costly and often even even impossible, |
292 running. Such a 24/7 security is costly and often even |
282 because voting machines need to be distributed usually the day |
293 impossible, because voting machines need to be distributed |
283 before to the polling station. These are often schools where |
294 usually the day before the election to the polling stations. |
284 the voting machines are kept unsecured overnight. The obvious |
295 These are often schools where the voting machines are kept |
285 solution of putting seals on computers also does not work: in |
296 unsecured overnight. The obvious solution of putting seals on |
286 the process of getting these DREs discredited (involving court |
297 computers did not work: in the process of getting these DREs |
287 cases) it was shown that seals can easily be circumvented. The |
298 discredited (involving court cases) it was shown that seals |
288 moral of this story is that election officials were |
299 can easily be circumvented. The moral of this story is that |
289 incentivised with money by the central government to obtain |
300 election officials were incentivised with money by the central |
290 new voting equipment and in the process fell prey to pariahs |
301 government to obtain new voting equipment and in the process |
291 which sold them a substandard product. Diebold was not the |
302 fell prey to pariahs which sold them a substandard product. |
292 only pariah in this project, but one of the more notorious |
303 Diebold was not the only pariah in this area, but one of the |
293 one. |
304 more notorious ones. |
294 |
305 |
295 Optical scan machines are slightly better from a security |
306 Optical scan machines are slightly better from a security |
296 point of view but by no means good enough. Their main idea |
307 point of view but by no means good enough. Their main idea |
297 is that the voter fills out a paper ballot, which is then |
308 is that the voter fills out a paper ballot, which is then |
298 scanned by a machine. At the very least the paper ballot can |
309 scanned by a machine. At the very least the paper ballot can |
305 |
316 |
306 \noindent An interesting solution for e-voting was designed in |
317 \noindent An interesting solution for e-voting was designed in |
307 India. Essentially they designed a bespoke voting device, |
318 India. Essentially they designed a bespoke voting device, |
308 which could not be used for anything else. Having a bespoke |
319 which could not be used for anything else. Having a bespoke |
309 device is a good security engineering decision because it |
320 device is a good security engineering decision because it |
310 makes the attack surface smaller. If you have a full-fledged |
321 makes the attack surface much smaller. If you have a |
311 computer behind your system, then you can do everything a |
322 full-fledged computer behind your system, then you can do |
312 computer can do\ldots{}that is a lot, including a lot of |
323 everything a computer can do\ldots{}and that is a lot, |
313 abuse. What was bad that these machines did not have the |
324 including a lot of abuse. What was bad about the devices in |
314 important paper trail: that means if an election was tampered |
325 India was that these machines did not have the important paper |
315 with, nobody would find out. Even if they had by their bespoke |
326 trail: that means if an election was tampered with, nobody |
316 design a very small attack surface, ethical hackers were still |
327 would find out. Even if they had by their bespoke design a |
317 able to tamper with them. The moral with Indian's voting |
328 very small attack surface, ethical hackers were still able to |
318 machines is that even if very good security design decisions |
329 tamper with them. The moral with Indian's voting machines is |
319 are taken, e-voting is very hard to get right.\bigskip |
330 that even if very good security design decisions are taken, |
|
331 e-voting is very hard to get right.\bigskip |
320 |
332 |
321 |
333 |
322 \noindent This brings us to the case of Estonia, which held in |
334 \noindent This brings us to the case of Estonia, which held in |
323 2007 the worlds first general election that used Internet. |
335 2007 the worlds first general election that used Internet. |
324 Again their solution made some good choices: for example |
336 Again their solution made some good choices: for example voter |
325 voter authentication is done via the Estonian ID card, |
337 authentication is done via the Estonian ID card, which |
326 which contains a chip like credit cards. They also made most |
338 contains a chip like on credit cards. They also made most of |
327 of their source code public for independent scrutiny. Of |
339 their source code public for independent scrutiny. Of course |
328 this openness means that people (hacker) will look at your |
340 this openness means that people (hackers) will look at your |
329 fingers and find code such as |
341 fingers and find code such as this snippet. |
330 |
342 |
331 {\footnotesize\lstinputlisting[language=Python,numbers=none] |
343 {\footnotesize\lstinputlisting[language=Python,numbers=none] |
332 {../progs/estonia.py}} |
344 {../progs/estonia.py}} |
333 |
345 |
334 \noindent which can be downloaded from their github |
346 \noindent If you want to have a look their code can be |
|
347 downloaded from their github |
335 repository.\footnote{\url{https://github.com/vvk-ehk/evalimine/}} |
348 repository.\footnote{\url{https://github.com/vvk-ehk/evalimine/}} |
336 Also their system is designed such that Internet voting is |
349 Also their system is designed such that Internet voting is |
337 used before the election: votes can be changed an unlimited |
350 used before the election: votes can be changed an unlimited |
338 amount of times, the last vote is tabulated, you can even |
351 amount of times, always the last vote is tabulated, you can |
339 change your vote on the polling day in person. This is an |
352 even change your vote on the polling day in person. This is an |
340 important security mechanism guarding against vote coercion, |
353 important security mechanism guarding against vote coercion, |
341 which of course is an important problem if you are allowed to |
354 which of course is an important problem if you are allowed to |
342 vote via Internet. |
355 vote via Internet. |
343 |
356 |
344 However, the weak spots in any Internet voting system are the |
357 However, the weak spots in any Internet voting system are the |
345 voters' computers and the central server. Unfortunately, their |
358 voters' computers and the central server. Unfortunately, their |
346 system is designed such that they needs to trust the integrity |
359 system is designed such that they needs to trust the integrity |
347 of voters’ computers, central server components and also the |
360 of voters’ computers, central server components and also the |
348 election staff. In 2014, group of independent observers around |
361 election staff. In 2014, a group of independent observers around |
349 Alex Halderman were able to scrutinise the election process in |
362 Alex Halderman were able to scrutinise the election process in |
350 Estonia. They found many weaknesses, for example careless |
363 Estonia. They found many weaknesses, for example careless |
351 handling of software updates on the servers. They also |
364 handling of software updates on the servers. They also |
352 simulated an election with the available software and were |
365 simulated an election with the available software and were |
353 able to covertly manipulate results by inserting malware on |
366 able to covertly manipulate results by inserting malware on |
377 board and find her encrypted vote posted. This is to |
390 board and find her encrypted vote posted. This is to |
378 make sure the vote was received by the server. |
391 make sure the vote was received by the server. |
379 |
392 |
380 \item When the election closes, all votes are shuffled and the |
393 \item When the election closes, all votes are shuffled and the |
381 system produces a non-interactive proof of a correct |
394 system produces a non-interactive proof of a correct |
382 shuffling. Correct in the sense that one cannot determine |
395 shuffling---correct in the sense that one cannot determine |
383 anymore who has voted for what. This will require a |
396 anymore who has voted for what. This will require a |
384 zero-knowledge-proof based shuffling procedure. |
397 shuffling procedure based on zero-knowledge-proofs. |
385 |
398 |
386 \item After a reasonable complaint period to let auditors |
399 \item After a reasonable complaint period, let auditors |
387 check the shuffling, all shuffled ballots are decrypted, |
400 check the shuffling, all shuffled ballots are decrypted, |
388 and the system provides a decryption proof for each |
401 and the system provides a decryption proof for each |
389 decrypted ballot. Again this will need a |
402 decrypted ballot. Again this will need a |
390 zero-knowledge-proof-type of method. |
403 zero-knowledge-proof-type of method. |
391 |
404 |
395 data and verify the shuffle, decryptions and tally. |
408 data and verify the shuffle, decryptions and tally. |
396 \end{enumerate} |
409 \end{enumerate} |
397 |
410 |
398 \noindent As you can see the whole process is not trivial at |
411 \noindent As you can see the whole process is not trivial at |
399 all and leaves out a number of crucial details (such as how to |
412 all and leaves out a number of crucial details (such as how to |
400 best distribute public keys). It even depends on a highly |
413 best distribute public keys for encryption). It even depends |
401 sophisticated process called \emph{zero-knowledge-proofs}. |
414 on a highly sophisticated process called |
402 They essentially allow one to convince somebody else to know |
415 \emph{zero-knowledge-proofs}. They essentially allow one to |
403 a secret without revealing what the secret is. This is a kind |
416 convince somebody else to know a secret without actually |
404 of cryptographic ``magic'', like the Hellman-Diffie protocol |
417 revealing what the secret is. This is a kind of cryptographic |
405 which can be used to establish a secret even if you can only |
418 ``magic'', like the Hellman-Diffie protocol which can be used |
406 exchange postcards with your communication partner. We will |
419 to establish a secret even if you can only exchange postcards |
407 look at zero-knowledge-proofs in a later lecture in more |
420 with your communication partner. We will look at |
408 detail. |
421 zero-knowledge-proofs in a later lecture in more detail. |
409 |
422 |
410 The point of these theoretical/hot-air musings is to show that |
423 The point of these theoretical/hot-air musings is to show that |
411 such an e-voting procedure is far from convenient: it takes |
424 such an e-voting procedure is far from convenient: it takes |
412 much more time to allow, for example, for scrutinising whether |
425 much more time to allow, for example, for scrutinising whether |
413 the votes were cast correctly. Very likely it will also not |
426 the votes were cast correctly. Very likely it will also not |
419 the Internet cannot be made secure with current technology. |
432 the Internet cannot be made secure with current technology. |
420 Voting has just too high demands on integrity and ballot |
433 Voting has just too high demands on integrity and ballot |
421 secrecy. This is different from online banking where the whole |
434 secrecy. This is different from online banking where the whole |
422 process is designed around authentication. If fraud occurs, |
435 process is designed around authentication. If fraud occurs, |
423 you try to identify who did what (somebody’s account got zero; |
436 you try to identify who did what (somebody’s account got zero; |
424 somewhere the money went). Even if there might be even more |
437 somewhere the money went). Even if there might be more |
425 gigantic sums at stake in online banking than with voting, |
438 gigantic sums at stake in online banking than with voting, |
426 it can be solved. That does not mean there are no problems |
439 it can be solved. That does not mean there are no problems |
427 with online banking. But with enough thought, they can |
440 with online banking. But with enough thought, they can |
428 usually be overcome with technology we have currently. This |
441 usually be overcome with technology we have currently. This |
429 is different with e-voting: even the best have not come |
442 is different with e-voting: even the best have not come |
430 up with something workable yet. |
443 up with something workable yet. |
431 |
444 |
432 |
445 |
433 This conclusion does not imply that in some special cases |
446 This conclusion does not imply that in some special cases |
434 Internet voting cannot be made to work securely. Just in a |
447 of Internet voting cannot be made to work securely. Just in a |
435 general election where stakes are very high, it does not work. |
448 general election where stakes are very high, it does not work. |
436 For example a good-enough and workable in-lecture online |
449 For example a good-enough and workable in-lecture online |
437 voting system where students' votes are anonymous and students |
450 voting system where students' votes are anonymous and students |
438 cannot tamper with the outcome, I am sure, can be implemented. |
451 cannot tamper with the outcome, I am sure, can be implemented. |
439 \bigskip |
452 \bigskip |