hws/hw02.tex
changeset 185 f10d905e947f
parent 109 b71ce151aba8
child 193 a97b828bf87f
equal deleted inserted replaced
184:55968b3205cc 185:f10d905e947f
     8 \section*{Homework 2}
     8 \section*{Homework 2}
     9 
     9 
    10 \begin{enumerate}
    10 \begin{enumerate}
    11 \item Voice voting is the method of casting a vote in the `open air' for everyone
    11 \item Voice voting is the method of casting a vote in the `open air' for everyone
    12 present to hear. Which of the following security requirements do paper ballots 
    12 present to hear. Which of the following security requirements do paper ballots 
    13 satisfy better than voice voting? Check all that apply and give a brief explanation 
    13 satisfy \textbf{better} than voice voting? Check all that apply and give a brief explanation 
    14 for your decision.
    14 for your decision.
    15 
    15 
    16 \begin{itemize}
    16 \begin{itemize}
    17 \item[$\Box$] Integrity\bigskip\bigskip
    17 \item[$\Box$] Integrity
    18 \item[$\Box$] Enfranchisement\bigskip\bigskip
    18 \item[$\Box$] Enfranchisement
    19 \item[$\Box$] Ballot secrecy\bigskip\bigskip
    19 \item[$\Box$] Ballot secrecy
    20 \item[$\Box$] Voter authentication\bigskip\bigskip
    20 \item[$\Box$] Voter authentication
    21 \item[$\Box$] Availability\bigskip\bigskip
    21 \item[$\Box$] Availability
    22 \end{itemize}
    22 \end{itemize}
    23 
    23 
    24 
    24 
    25 \item Explain how an attacker can use chain voting in order to influence the outcome of a 
    25 \item Explain how an attacker can use chain voting in order to influence the outcome of a 
    26 poll using paper ballots. 
    26 poll using paper ballots. 
    27 
    27 
    28 \item Which of the following mechanisms help with defending against chain voting? Check all 
    28 \item Which of the following mechanisms help with defending against chain voting? Check all 
    29 that apply. Give a brief reason for each defence that mitigates chain voting attacks.
    29 that apply. Give a brief reason for each defence that mitigates chain voting attacks.
    30 
    30 
    31 \begin{itemize}
    31 \begin{itemize}
    32 \item[$\Box$] Using a glass ballot box to make it clear there are no ballots in the box before the start of the election.
    32 \item[$\Box$] Using a glass ballot box to make it clear there are no
       
    33   ballots in the box before the start of the election.
    33 \item[$\Box$] Distributing ballots publicly before the election.
    34 \item[$\Box$] Distributing ballots publicly before the election.
    34 \item[$\Box$] Checking that a voter's ID (drivers license, passport) matches the voter.
    35 \item[$\Box$] Checking that a voter's ID (drivers license, passport) matches the voter.
    35 \item[$\Box$] Each ballot has a unique ID. When a voter is given a ballot, the ID is recorded. When the voter submits his or her ballot, this ID is checked against the record.
    36 \item[$\Box$] Each ballot has a unique ID. When a voter is given a ballot, the ID is recorded. When the voter submits his or her ballot, this ID is checked against the record.
    36 \end{itemize}
    37 \end{itemize}
    37 
    38