handouts/ho02.tex
changeset 227 7807863c4196
parent 199 20af800ce736
child 276 d7109c6e721d
equal deleted inserted replaced
226:01fe5aba8781 227:7807863c4196
     8 
     8 
     9 In security engineering, there are many counter-intuitive
     9 In security engineering, there are many counter-intuitive
    10 phenomena: for example I am happy (more or less) to use online
    10 phenomena: for example I am happy (more or less) to use online
    11 banking every day, where if something goes wrong, I can
    11 banking every day, where if something goes wrong, I can
    12 potentially lose a lot of money, but I am staunchly against
    12 potentially lose a lot of money, but I am staunchly against
    13 using electronic voting (lets call it e-voting for short).
    13 using electronic voting (let's call it e-voting for short).
    14 E-voting is an idea that is nowadays often promoted in order
    14 E-voting is an idea that is nowadays often promoted in order
    15 to counter low turnouts in elections\footnote{In my last local
    15 to counter low turnouts in elections\footnote{In my last local
    16 election where I was eligible to vote only 48\% of the
    16 election where I was eligible to vote only 48\% of the
    17 population have cast their ballot. I was, I shamefully admit,
    17 population have cast their ballot. I was, I shamefully admit,
    18 one of the non-voters.} and generally sounds like a good idea.
    18 one of the non-voters.} and generally sounds like a good idea.
    33 scale of Turing's halting problem, which is proved that it can
    33 scale of Turing's halting problem, which is proved that it can
    34 never be solved in general, but more in the category of being
    34 never be solved in general, but more in the category of being
    35 unsolvable with current technology. This is not just my
    35 unsolvable with current technology. This is not just my
    36 opinion, but also shared by many security researchers amongst
    36 opinion, but also shared by many security researchers amongst
    37 them Alex Halderman, who is the world-expert on this subject
    37 them Alex Halderman, who is the world-expert on this subject
    38 and from whose course on Securing Digital Democracy I have
    38 and from whose Coursera course on Securing Digital Democracy I
    39 most of my information and inspiration. It is also a
    39 have most of my information and inspiration. It is also a
    40 controversial topic in many countries:
    40 controversial topic in many countries:
    41 
    41 
    42 \begin{itemize}
    42 \begin{itemize}
    43 \item The Netherlands between 1997--2006 had electronic voting
    43 \item The Netherlands between 1997--2006 had electronic voting
    44       machines, but ``hacktivists'' had found they can be
    44       machines, but ``hacktivists'' had found they can be
    54       polls, but to my knowledge does not use any e-voting in
    54       polls, but to my knowledge does not use any e-voting in
    55       elections.
    55       elections.
    56       
    56       
    57 \item The US used mechanical machines since the 1930s, later
    57 \item The US used mechanical machines since the 1930s, later
    58       punch cards, now DREs and optical scan voting machines.
    58       punch cards, now DREs and optical scan voting machines.
       
    59       But there is a lot of evidence that DREs and optical 
       
    60       scan voting machines are not as secure as they should
       
    61       be.
    59 
    62 
    60 \item Estonia used since 2007 the Internet for national
    63 \item Estonia used since 2007 the Internet for national
    61       elections. There were earlier pilot studies for voting
    64       elections. There were earlier pilot studies for voting
    62       via Internet in other countries.
    65       via Internet in other countries.
    63 
    66 
    87         always have an error rate: people after several hours
    90         always have an error rate: people after several hours
    88         looking at ballots will inevitably miscount votes. But
    91         looking at ballots will inevitably miscount votes. But
    89         what should be ensured is that the error rate does not
    92         what should be ensured is that the error rate does not
    90         change the outcome of the election. Of course if
    93         change the outcome of the election. Of course if
    91         elections continue to be on knives edges we need to
    94         elections continue to be on knives edges we need to
    92         ensure that we have a rather small error rate. 
    95         strive for rather small error rates. 
    93           
    96           
    94   \item There might be gigantic sums at stake and need to be
    97   \item There might be gigantic sums at stake and need to be
    95         defended against. The problem with this is that if
    98         defended against. The problem with this is that if
    96         the incentives are great and enough resources are
    99         the incentives are great and enough resources are
    97         available, then maybe it is feasible to mount a DoS
   100         available, then maybe it is feasible to mount a DoS
    98         attack against voting server and by bringing the
   101         attack against the voting server and by bringing the
    99         system to its knees, change the outcome of an
   102         system to its knees, change the outcome of an
   100         election. Not to mention to hack the complete
   103         election. Not to mention to hack the complete
   101         system with malware and change votes undetectably.                
   104         system with malware and change votes undetectably.                
   102   \end{itemize}
   105   \end{itemize}
   103 
   106 
   130         cannot vote. While this sounds an innocent
   133         cannot vote. While this sounds an innocent
   131         requirement, in fact some parts of the population for
   134         requirement, in fact some parts of the population for
   132         one reason or another just do not have driving
   135         one reason or another just do not have driving
   133         licenses. They are now excluded. Also if you insist on
   136         licenses. They are now excluded. Also if you insist on
   134         paper ballots you have to have special provisions for
   137         paper ballots you have to have special provisions for
   135         blind people. Otherwise they cannot vote.
   138         blind people. Otherwise they too cannot vote.
   136  \end{itemize}
   139  \end{itemize}
   137   
   140   
   138 \item {\bf Availability}
   141 \item {\bf Availability}
   139   \begin{itemize}
   142   \begin{itemize}
   140   \item The voting system should accept all authorised votes
   143   \item The voting system should accept all authorised votes
   153 \end{center}
   156 \end{center}
   154 
   157 
   155 \noindent If we had ballots with complete voter
   158 \noindent If we had ballots with complete voter
   156 identification, then we can improve integrity because we can
   159 identification, then we can improve integrity because we can
   157 trace back the votes to the voters. This would be good when
   160 trace back the votes to the voters. This would be good when
   158 verifying the results or recounting. But such an
   161 verifying the results or when recounting. But such an
   159 identification would violate ballot secrecy (you can prove to
   162 identification would violate ballot secrecy (you can prove to
   160 somebody else how you voted). In contrast, if we remove all
   163 somebody else how you voted). In contrast, if we remove all
   161 identification for ensuring ballot secrecy, then we have to
   164 identification for ensuring ballot secrecy, then we have to
   162 ensure that no ``vote-stuffing'' occurs. Similarly, if we
   165 ensure that no ``vote-stuffing'' occurs. Similarly, if we
   163 improve authentication by requiring a to be present at the
   166 improve authentication by requiring to be present at the
   164 polling station with an ID card, then we exclude absentee
   167 polling station with an ID card, then we exclude absentee
   165 voting.
   168 voting.
   166 
   169 
   167 To tackle the problem of e-voting, we should first have a look
   170 To tackle the problem of e-voting, we should first have a look
   168 into the history of voting and how paper-based ballots
   171 into the history of voting and how paper-based ballots
   169 evolved. Because also good-old-fashioned paper ballot voting
   172 evolved. Because also good-old-fashioned paper ballot voting
   170 is not entirely trivial and immune from being hacked. We know
   173 is not entirely trivial and immune from being hacked. We know
   171 for sure that elections were held in Athens as early as 600
   174 for sure that elections were held in Athens as early as 600
   172 BC, but might even date to the time of Mesopotamia and also in
   175 BC, but might even date to the time of Mesopotamia and also in
   173 India some kind of ``republics'' might have existed before the
   176 India some kind of republics might have existed before the
   174 Alexander the Great invaded it. Have a look at Wikipedia about
   177 Alexander the Great invaded it. Have a look at Wikipedia about
   175 the history of democracy for more information. These elections
   178 the history of democracy for more information. These elections
   176 were mainly based on voting by show of hands. While this
   179 were mainly based on voting by show of hands. While this
   177 method of voting satisfies many of the requirements stipulated
   180 method of voting satisfies many of the requirements stipulated
   178 above, the main problem with hand voting is that it does not
   181 above, the main problem with hand voting is that it does not
   179 guaranty ballot secrecy. As far as I know the old Greeks and
   182 guaranty ballot secrecy. As far as I know the old Greeks and
   180 Romans did not perceive this as a problem, but the result was
   183 Romans did not perceive this as a problem, but the result was
   181 that their elections favoured rich, famous people who had
   184 that their elections favoured rich, famous people who had
   182 enough resources to swing votes. Even using small coloured
   185 enough resources to swing votes. Even using small coloured
   183 stones did not really mitigate the problem with ballot
   186 stones, which were also used at that time, did not really
   184 secrecy. The problem of authorisation was solved by friends or
   187 mitigate the problem with ballot secrecy. The problem of
   185 neighbours vouching for you to prove you are eligible to vote
   188 authorisation was solved by friends or neighbours vouching for
   186 (there were no ID cards in ancient Greece and Rome).
   189 you to prove you are eligible to vote (there were no ID cards
       
   190 in ancient Greece and Rome).
   187 
   191 
   188 Starting with the French Revolution and the US constitution,
   192 Starting with the French Revolution and the US constitution,
   189 people started to value a more egalitarian approach to voting
   193 people began to value a more egalitarian approach to voting
   190 and electing officials. This was also the time where paper
   194 and electing officials. This was also the time where paper
   191 ballots started to become the prevailing form of casting
   195 ballots started to become the prevailing form of casting
   192 votes. While more resistant against voter intimidation, paper
   196 votes. While more resistant against voter intimidation, paper
   193 ballots need a number of security mechanisms to avoid fraud.
   197 ballots need a number of security mechanisms to avoid fraud.
   194 For example you need voting booths to fill out the ballot in
   198 For example you need voting booths for being able to fill out
   195 secret. Also transparent ballot boxes are often used in order
   199 the ballot in secret. Also transparent ballot boxes are often
   196 to easily detect and prevent vote stuffing (prefilling the
   200 used in order to easily detect and prevent vote stuffing
   197 ballot box with false votes). 
   201 (prefilling the ballot box with false votes). 
   198 
   202 
   199 \begin{center}
   203 \begin{center}
   200 \includegraphics[scale=2.5]{../pics/ballotbox.jpg}
   204 \includegraphics[scale=2.5]{../pics/ballotbox.jpg}
   201 \end{center}
   205 \end{center}
   202 
   206 
   203 \noindent Another security mechanism is to guard the ballot
   207 \noindent Another security mechanism is to guard the ballot
   204 box against any tampering during the election until counting.
   208 box against any tampering during the election until counting.
   205 The counting needs to be done by a team potentially involving
   209 The counting needs to be done by a team potentially involving
   206 also independent observers. One interesting attack against
   210 also independent observers. 
   207 completely anonymous paper ballots is called \emph{chain vote
   211 
   208 attack}. It works if the paper ballots are given out to each
   212 One interesting attack against completely anonymous paper
   209 voter at the polling station. Then an attacker can give the
   213 ballots is called \emph{chain vote attack}. It works if the
   210 prefilled ballot to a voter. The voter uses this prefilled
   214 paper ballots are given out to each voter at the polling
   211 ballot to cast the vote, and then returns the empty ballot
   215 station. Then an attacker can give the prefilled ballot to a
   212 back to the attacker who now compensates the voter. The blank
   216 voter. The voter uses this prefilled ballot to cast the vote,
   213 ballot can be reused for the next voter. 
   217 and then returns the empty ballot paper back to the attacker who now
   214 
   218 compensates the voter. The blank ballot can be reused for the
   215 The point is that paper ballots have evolved over some time 
   219 next voter. 
       
   220 
       
   221 To sum up, the point is that paper ballots have evolved over some time 
   216 and no single best method has emerged for preventing fraud.
   222 and no single best method has emerged for preventing fraud.
   217 But the involved technology is well understood in order to
   223 But the involved technology is well understood in order to
   218 provide good enough security with paper ballots.
   224 provide good enough security with paper ballots.
   219 
   225 
   220 \subsection*{E-Voting}
   226 \subsection*{E-Voting}
   227 provide at least the same security, privacy and transparency
   233 provide at least the same security, privacy and transparency
   228 as the system it replaces.''
   234 as the system it replaces.''
   229 \end{quote}
   235 \end{quote}
   230 
   236 
   231 \noindent Whenever people argue in favour of e-voting they
   237 \noindent Whenever people argue in favour of e-voting they
   232 seem to be ignore this basic premise.\bigskip
   238 seem to be ignoring this basic premise.\bigskip
   233 
   239 
   234 \noindent After the debacle of the Florida presidential
   240 \noindent After the debacle of the Florida presidential
   235 election in 2000, many counties used Direct-Recording
   241 election in 2000, many voting precincts in the US used
   236 Electronic voting machines (DREs) or optical scan machines.
   242 Direct-Recording Electronic voting machines (DREs) or optical
   237 One popular model of DRE was sold by the company called
   243 scan machines. One popular model of DREs was sold by a
   238 Diebold. In hindsight they were a complete disaster: the
   244 company called Diebold. In hindsight they were a complete
   239 products were inferior and the company incompetent. Direct
   245 disaster: the products were inadequate and the company
   240 recording meant that there was no paper trail, the votes were
   246 incompetent. Direct recording meant that there was no paper
   241 directly recorded on memory cards. Thus the voters had no
   247 trail, the votes were directly recorded on memory cards. Thus
   242 visible assurance whether the votes were correctly cast. The
   248 the voters had no visible assurance whether the votes were
   243 machines behind these DREs were ``normal'' windows computers,
   249 correctly cast. Even if there is a printout provided;
   244 which could be used for anything, for example for changing
   250 it does not give any guaranty about what is recorded on
   245 votes. Why did nobody at Diebold think of that? That this was
   251 the memory card.
   246 eventually done undetectably is the result of the
   252 
   247 determination of ethical hackers like Alex Halderman. His
   253 The machines behind these DREs were ``normal'' windows
   248 group thoroughly hacked them showing that election fraud is
   254 computers, which could be used for anything, for example for
   249 easily possible. They managed to write a virus that infected
   255 changing votes. Why did nobody at Diebold think of that? I
   250 the whole system by having only access to a single machine.
   256 have no idea. But that this was eventually done undetectably
       
   257 is the result of the determination of ethical hackers like
       
   258 Alex Halderman. His group thoroughly hacked Diebold's DREs
       
   259 showing that election fraud with them is easily possible. They
       
   260 even managed to write a virus that infected the whole system
       
   261 by having only access to a single machine.
   251 
   262 
   252 \begin{figure}[t]
   263 \begin{figure}[t]
   253 \begin{center}
   264 \begin{center}
   254 \begin{tabular}{c}
   265 \begin{tabular}{c}
   255 \includegraphics[scale=0.45]{../pics/dre1.jpg}\; 
   266 \includegraphics[scale=0.45]{../pics/dre1.jpg}\; 
   260 \caption{Direct-Recording Electronic voting machines above;
   271 \caption{Direct-Recording Electronic voting machines above;
   261 an optical scan machine below.\label{machines}}
   272 an optical scan machine below.\label{machines}}
   262 \end{figure}
   273 \end{figure}
   263 
   274 
   264 What made matters worse was that Diebold tried to hide their
   275 What made matters worse was that Diebold tried to hide their
   265 incompetency and inferiority of their products, by requiring
   276 incompetency and the inferiority of their products, by
   266 that election counties must not give the machines up for
   277 requiring that election counties must not give the machines up
   267 independent review. They also kept their source secret. 
   278 for independent review. They also kept their source secret.
   268 This meant Halderman and his group had to obtain a machine
   279 This meant Halderman and his group had to obtain a machine not
   269 not in the official channels. Then they had to reverse 
   280 through the official channels. They then had to reverse
   270 engineer the source code in order to design their attack. 
   281 engineer the source code in order to design their attack. What
   271 What this all showed is that a shady security design is no 
   282 this all showed is that a shady security design is no match to
   272 match to a determined hacker. 
   283 a determined hacker. 
   273 
   284 
   274 Apart from the obvious failings (for example no papertrail),
   285 Apart from the obvious failings (for example no papertrail),
   275 this story also told another side. While a paper ballot box
   286 this story also told another side. While a paper ballot box
   276 need to be kept secure from the beginning of the election
   287 need to be kept secure from the beginning of the election
   277 (when it needs to be ensured it is empty) until the end of the
   288 (when it needs to be ensured it is empty) until the end of the
   278 day, electronic voting machines need to be kept secure the
   289 day, electronic voting machines need to be kept secure the
   279 whole year. The reason is of course one cannot see whether
   290 whole year. The reason is of course that one cannot see
   280 somebody has tampered with the program a computer is running.
   291 whether somebody has tampered with the program a computer is
   281 Such a 24/7 security costly and often even even impossible,
   292 running. Such a 24/7 security is costly and often even
   282 because voting machines need to be distributed usually the day
   293 impossible, because voting machines need to be distributed
   283 before to the polling station. These are often schools where
   294 usually the day before the election to the polling stations.
   284 the voting machines are kept unsecured overnight. The obvious
   295 These are often schools where the voting machines are kept
   285 solution of putting seals on computers also does not work: in
   296 unsecured overnight. The obvious solution of putting seals on
   286 the process of getting these DREs discredited (involving court
   297 computers did not work: in the process of getting these DREs
   287 cases) it was shown that seals can easily be circumvented. The
   298 discredited (involving court cases) it was shown that seals
   288 moral of this story is that election officials were 
   299 can easily be circumvented. The moral of this story is that
   289 incentivised with money by the central government to obtain
   300 election officials were incentivised with money by the central
   290 new  voting equipment and in the process fell prey to pariahs
   301 government to obtain new voting equipment and in the process
   291 which sold them a substandard product. Diebold was not the
   302 fell prey to pariahs which sold them a substandard product.
   292 only pariah in this project, but one of the more notorious
   303 Diebold was not the only pariah in this area, but one of the
   293 one.
   304 more notorious ones.
   294 
   305 
   295 Optical scan machines are slightly better from a security
   306 Optical scan machines are slightly better from a security
   296 point of view but by no means good enough. Their main idea
   307 point of view but by no means good enough. Their main idea
   297 is that the voter fills out a paper ballot, which is then 
   308 is that the voter fills out a paper ballot, which is then 
   298 scanned by a machine. At the very least the paper ballot can 
   309 scanned by a machine. At the very least the paper ballot can 
   305 
   316 
   306 \noindent An interesting solution for e-voting was designed in
   317 \noindent An interesting solution for e-voting was designed in
   307 India. Essentially they designed a bespoke voting device,
   318 India. Essentially they designed a bespoke voting device,
   308 which could not be used for anything else. Having a bespoke
   319 which could not be used for anything else. Having a bespoke
   309 device is a good security engineering decision because it
   320 device is a good security engineering decision because it
   310 makes the attack surface smaller. If you have a full-fledged
   321 makes the attack surface much smaller. If you have a
   311 computer behind your system, then you can do everything a
   322 full-fledged computer behind your system, then you can do
   312 computer can do\ldots{}that is a lot, including a lot of
   323 everything a computer can do\ldots{}and that is a lot,
   313 abuse. What was bad that these machines did not have the
   324 including a lot of abuse. What was bad about the devices in
   314 important paper trail: that means if an election was tampered
   325 India was that these machines did not have the important paper
   315 with, nobody would find out. Even if they had by their bespoke
   326 trail: that means if an election was tampered with, nobody
   316 design a very small attack surface, ethical hackers were still
   327 would find out. Even if they had by their bespoke design a
   317 able to tamper with them. The moral with Indian's voting
   328 very small attack surface, ethical hackers were still able to
   318 machines is that even if very good security design decisions
   329 tamper with them. The moral with Indian's voting machines is
   319 are taken, e-voting is very hard to get right.\bigskip 
   330 that even if very good security design decisions are taken,
       
   331 e-voting is very hard to get right.\bigskip 
   320 
   332 
   321 
   333 
   322 \noindent This brings us to the case of Estonia, which held in
   334 \noindent This brings us to the case of Estonia, which held in
   323 2007 the worlds first general election that used Internet.
   335 2007 the worlds first general election that used Internet.
   324 Again their solution made some good choices: for example
   336 Again their solution made some good choices: for example voter
   325 voter authentication is done via the Estonian ID card,
   337 authentication is done via the Estonian ID card, which
   326 which contains a chip like credit cards. They also made most
   338 contains a chip like on credit cards. They also made most of
   327 of their source code public for independent scrutiny. Of
   339 their source code public for independent scrutiny. Of course
   328 this openness means that people (hacker) will look at your 
   340 this openness means that people (hackers) will look at your
   329 fingers and find code such as
   341 fingers and find code such as this snippet.
   330 
   342 
   331 {\footnotesize\lstinputlisting[language=Python,numbers=none]
   343 {\footnotesize\lstinputlisting[language=Python,numbers=none]
   332 {../progs/estonia.py}}
   344 {../progs/estonia.py}}
   333 
   345 
   334 \noindent which can be downloaded from their github
   346 \noindent If you want to have a look their code can be
       
   347 downloaded from their github
   335 repository.\footnote{\url{https://github.com/vvk-ehk/evalimine/}}
   348 repository.\footnote{\url{https://github.com/vvk-ehk/evalimine/}}
   336 Also their system is designed such that Internet voting is
   349 Also their system is designed such that Internet voting is
   337 used before the election: votes can be changed an unlimited
   350 used before the election: votes can be changed an unlimited
   338 amount of times, the last vote is tabulated, you can even
   351 amount of times, always the last vote is tabulated, you can
   339 change your vote on the polling day in person. This is an
   352 even change your vote on the polling day in person. This is an
   340 important security mechanism guarding against vote coercion,
   353 important security mechanism guarding against vote coercion,
   341 which of course is an important problem if you are allowed to
   354 which of course is an important problem if you are allowed to
   342 vote via Internet.
   355 vote via Internet.
   343 
   356 
   344 However, the weak spots in any Internet voting system are the
   357 However, the weak spots in any Internet voting system are the
   345 voters' computers and the central server. Unfortunately, their
   358 voters' computers and the central server. Unfortunately, their
   346 system is designed such that they needs to trust the integrity
   359 system is designed such that they needs to trust the integrity
   347 of voters’ computers, central server components and also the
   360 of voters’ computers, central server components and also the
   348 election staff. In 2014, group of independent observers around
   361 election staff. In 2014, a group of independent observers around
   349 Alex Halderman were able to scrutinise the election process in
   362 Alex Halderman were able to scrutinise the election process in
   350 Estonia. They found many weaknesses, for example careless
   363 Estonia. They found many weaknesses, for example careless
   351 handling of software updates on the servers. They also
   364 handling of software updates on the servers. They also
   352 simulated an election with the available software and were
   365 simulated an election with the available software and were
   353 able to covertly manipulate results by inserting malware on
   366 able to covertly manipulate results by inserting malware on
   363 \end{center}
   376 \end{center}
   364 
   377 
   365 \noindent This brings us to the question, what could be a
   378 \noindent This brings us to the question, what could be a
   366 viable electronic voting process in
   379 viable electronic voting process in
   367 \underline{\textbf{\emph{theory}}} with current technology?
   380 \underline{\textbf{\emph{theory}}} with current technology?
   368 In the literature one can find proposals such as
   381 In the literature one can find proposals such as this one:
   369 
   382 
   370 \begin{enumerate}
   383 \begin{enumerate}
   371 \item Alice prepares and audits some ballots, then casts an
   384 \item Alice prepares and audits some ballots, then casts an
   372       encrypted ballot, which requires her to authenticate to
   385       encrypted ballot, which requires her to authenticate to
   373       a server.
   386       a server.
   377       board and find her encrypted vote posted. This is to
   390       board and find her encrypted vote posted. This is to
   378        make sure the vote was received by the server.
   391        make sure the vote was received by the server.
   379 
   392 
   380 \item When the election closes, all votes are shuffled and the
   393 \item When the election closes, all votes are shuffled and the
   381       system produces a non-interactive proof of a correct
   394       system produces a non-interactive proof of a correct
   382       shuffling. Correct in the sense that one cannot determine
   395       shuffling---correct in the sense that one cannot determine
   383        anymore who has voted for what. This will require a 
   396        anymore who has voted for what. This will require a 
   384        zero-knowledge-proof based shuffling procedure.
   397        shuffling procedure based on zero-knowledge-proofs.
   385 
   398 
   386 \item After a reasonable complaint period to let auditors
   399 \item After a reasonable complaint period, let auditors
   387       check the shuffling, all shuffled ballots are decrypted,
   400       check the shuffling, all shuffled ballots are decrypted,
   388       and the system provides a decryption proof for each
   401       and the system provides a decryption proof for each
   389       decrypted ballot. Again this will need a 
   402       decrypted ballot. Again this will need a 
   390       zero-knowledge-proof-type of method.
   403       zero-knowledge-proof-type of method.
   391 
   404 
   395       data and verify the shuffle, decryptions and tally.
   408       data and verify the shuffle, decryptions and tally.
   396 \end{enumerate}
   409 \end{enumerate}
   397 
   410 
   398 \noindent As you can see the whole process is not trivial at
   411 \noindent As you can see the whole process is not trivial at
   399 all and leaves out a number of crucial details (such as how to
   412 all and leaves out a number of crucial details (such as how to
   400 best distribute public keys). It even depends on a highly
   413 best distribute public keys for encryption). It even depends
   401 sophisticated process called \emph{zero-knowledge-proofs}.
   414 on a highly sophisticated process called
   402 They essentially allow one to convince somebody else to know
   415 \emph{zero-knowledge-proofs}. They essentially allow one to
   403 a secret without revealing what the secret is. This is a kind
   416 convince somebody else to know a secret without actually
   404 of cryptographic ``magic'', like the Hellman-Diffie protocol
   417 revealing what the secret is. This is a kind of cryptographic
   405 which can be used to establish a secret even if you can only
   418 ``magic'', like the Hellman-Diffie protocol which can be used
   406 exchange postcards with your communication partner. We will
   419 to establish a secret even if you can only exchange postcards
   407 look at zero-knowledge-proofs in a later lecture in more
   420 with your communication partner. We will look at
   408 detail. 
   421 zero-knowledge-proofs in a later lecture in more detail. 
   409 
   422 
   410 The point of these theoretical/hot-air musings is to show that
   423 The point of these theoretical/hot-air musings is to show that
   411 such an e-voting procedure is far from convenient: it takes
   424 such an e-voting procedure is far from convenient: it takes
   412 much more time to allow, for example, for scrutinising whether
   425 much more time to allow, for example, for scrutinising whether
   413 the votes were cast correctly. Very likely it will also not
   426 the votes were cast correctly. Very likely it will also not
   419 the Internet cannot be made secure with current technology.
   432 the Internet cannot be made secure with current technology.
   420 Voting has just too high demands on integrity and ballot
   433 Voting has just too high demands on integrity and ballot
   421 secrecy. This is different from online banking where the whole
   434 secrecy. This is different from online banking where the whole
   422 process is designed around authentication. If fraud occurs,
   435 process is designed around authentication. If fraud occurs,
   423 you try to identify who did what (somebody’s account got zero;
   436 you try to identify who did what (somebody’s account got zero;
   424 somewhere the money went). Even if there might be even more 
   437 somewhere the money went). Even if there might be more 
   425 gigantic sums at stake in online banking than with voting,
   438 gigantic sums at stake in online banking than with voting,
   426 it can be solved. That does not mean there are no problems
   439 it can be solved. That does not mean there are no problems
   427 with online banking. But with enough thought, they can
   440 with online banking. But with enough thought, they can
   428 usually be overcome with technology we have currently. This
   441 usually be overcome with technology we have currently. This
   429 is different with e-voting: even the best have not come
   442 is different with e-voting: even the best have not come
   430 up with something workable yet.
   443 up with something workable yet.
   431 
   444 
   432 
   445 
   433 This conclusion does not imply that in some special cases
   446 This conclusion does not imply that in some special cases
   434 Internet voting cannot be made to work securely. Just in a
   447 of Internet voting cannot be made to work securely. Just in a
   435 general election where stakes are very high, it does not work.
   448 general election where stakes are very high, it does not work.
   436 For example a good-enough and workable in-lecture online
   449 For example a good-enough and workable in-lecture online
   437 voting system where students' votes are anonymous and students
   450 voting system where students' votes are anonymous and students
   438 cannot tamper with the outcome, I am sure, can be implemented. 
   451 cannot tamper with the outcome, I am sure, can be implemented. 
   439 \bigskip
   452 \bigskip