The Punchscan Voting System Refinement and System Design Rick Carback Kevin Fisher Sandi Lwin May 8, 2006.

Slides:



Advertisements
Similar presentations
Basic Computer Vocabulary
Advertisements

Secret Ballot Receipts: True Voter Verifiable Elections Author: David Chaum Published: IEEE Security & Privacy Presenter: Adam Anthony.
Testing the AutoMARK Ballot Marking Device on Election Day.
Electronic Voting Systems
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
Prepared by :  Zain Al Ardah.  Renan Atrash. Supervisor :  Haya Sammaneh.
A Pairing-Based Blind Signature
Voting Systems.  DS200 – new 2013  DS850 – new 2013  AutoMARK Voting Equipment.
ThreeBallot, VAV, and Twin Ronald L. Rivest – MIT CSAIL Warren D. Smith - CRV Talk at EVT’07 (Boston) August 6, 2007 Ballot Box Ballot Mixer Receipt G.
On the Security of Ballot Receipts in E2E Voting Systems Jeremy Clark, Aleks Essex, and Carlisle Adams Presented by Jeremy Clark.
Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner UC-Berkeley Direct Recording Electronic voting machines (DREs)
1 CS2SPE- Group project presentation Haia Al-Majali Bojin Zhou Rania Ali Suraj Patel Fatima Tunc Victoria Casas Sam Diab 19 th March 2008.
1 Receipt-freedom in voting Pieter van Ede. 2 Important properties of voting  Authority: only authorized persons can vote  One vote  Secrecy: nobody.
By Varun Jain. Introduction  Florida 2000 election fiasco, drew conclusion that paper ballots couldn’t be counted  Computerized voting system, DRE (Direct.
Charlie Daniels Arkansas Secretary of State HAVA Compliant Voting Systems Security Considerations General Recommendations to Enhance Security and Integrity.
Receipt-Free Universally-Verifiable Voting With Everlasting Privacy Tal Moran Joint work with Moni Naor.
Presentation by Christine McElroy
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Lesson 4-Installing Network Operating Systems. Overview Installing and configuring Novell NetWare 6.0. Installing and configuring Windows 2000 Server.
Electronic Voting Linh Nguyen. Electronic Voting  Voting Technologies  The Florida 2000 Election  Direct Recording Electronic Devices (DREs)‏ - Diebold.
COMPUTER SYSTEM COMPONENTS ACTIVITY
Computer Skills Preparatory Year Presented by: L.Obead Alhadreti.
Computer Parts There are many parts that work together to make a computer work.
Guide to the Voting Action Planner Voting is the way we elect government officials, pass laws and decide on issues…
©2001 Chariot Software Group Using MicroGrade Classroom Management Software.
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
THE WONDERFUL HISTORY OF COMPUTERS FROM THE BEGINNING HARDWARE, SOFTWARE,SAFTEY, AND COMPUTER ETHICS.
Cryptographic Voting Protocols: A Systems Perspective By Chris Karlof, Naveen Sastry, and David Wagner University of California, Berkely Proceedings of.
Lesson 4 Computer Software
Voting Systems.  DS200  DS850  AutoMARK Voting Equipment.
Fayoum University Faculty of Engineering Electrical Engineering Department E-voting system Using Smart Card Under the supervision Of: Dr. Magdy Amer.
Protecting Web 2.0 Services from Botnet Exploitations Cybercrime and Trustworthy Computing Workshop (CTC), 2010 Second Nguyen H Vo, Josef Pieprzyk Department.
TERMS TO KNOW. Desktop This does not mean a computer desktop vs. a laptop. You probably keep a number of commonly used items on your desk at home such.
Jeopardy Keyboard Computer Parts Computer Parts Networks Internet Word Processing Basic Level.
A Brief Intro to Aperio and Eperio Aleksander Essex University of Waterloo, *University of Ottawa SecVote 2010 Sept. 3, Bertinoro Italy.
TOWARDS OPEN VOTE VERIFICATION METHOD IN E-VOTING Ali Fawzi Najm Al-Shammari17’th July2012 Sec Vote 2012.
NIST Voting Data Formats Workshop Gaithersburg October, 2009 Parker Abercrombie EML for Open Voting.
Secret Ballot Receipts True Voter-Verifiable Elections Richard Carback Kevin Fisher Sandi Lwin CMSC 691v April 3, 2005.
Idaho Procedures AUTOMARK BALLOT MARKING DEVICE. Document Firmware Upgrade  AutoMark Voter Assist Terminal, (VAT) version or  AutoMark.
All Input is Evil (Part 1) Introduction Will not cover everything Healthy level of paranoia Use my DVD Swap Shop application (week 2)
ITGS Databases.
Computer Systems Mrs. Butera. Computer Systems Hardware Software.
Idaho Procedures M100 OPTICAL SCAN PRECINCT TABULATOR.
“The right of citizens of the United States to vote shall not be denied or abridged by the United States or by any state on account of [race, color, or.
How and what to observe in e-enabled elections Presentation by Mats Lindberg, Election Adviser, Organisation for Security and Co-operation in Europe (OSCE)
OARN Database UPDATE – SEPTEMBER We’re Live – and Testing  The site is up and running in Google’s data centers:  The site has been secured: 
CS779 Term Project Steve Shoyer Section 5 December 9, 2006 Week 6.
Voting System The PunchScan Rick Carback, David Chaum, Jeremy Clark, Aleks Essex, Kevin Fisher, Ben Hosp, Stefan Popoveniuc, and Jeremy Robin.
CS101 Network Setup. Parts of a network Everything on a network is called a ____ Three main types of _____: –__________ Devices = Printers, Scanners,
Three Jobs of a Computer 1. Input 2. Processing 3. Output.
Click once to reveal the definition. Think of the answer. Then click to see if you were correct. HARDWARE Physical parts of the computer.
Main Computer Components
Secure Remote Electronic Voting CSE-681 Fall 2006 David Foster and Laura Stapleton Laura StapletonLaura Stapleton.
Week1: Introduction to Computer Networks. Copyright © 2012 Cengage Learning. All rights reserved.2 Objectives 2 Describe basic computer components and.
BALLOT STATION. DUTIES OF THE BALLOT STATION: Account for and Secure Ballots Issue the Correct Ballot to Eligible Voters.
Idaho Procedures M650 GREEN LIGHT OPTICAL SCAN TABULATOR.
EA Tablet ® Poll Worker Training Setup and Use of the EA Tablet ® Ohio Version – Fourth Edition © 2014 Election Administrators, LLC C ONFIDENTIAL N OTICE.
What is electronic voting An electronic voting (e-voting) system is a voting system in which the election data is recorded, stored and processed primarily.
Fourth Grade Home Directory/H-Drive The location on the server where individual users can save their work. This directory is named the same as the username.
ThreeBallot, VAV, and Twin
E-voting …and why it’s good..
Electronic Voting Machine Using MSP430 With Voice Feedback System
Identify information technology equipment/software and operating systems supported by the organization By Jack+ Aaron.
CS101 Bigger Networks.
Tiers vs. Layers.
eVoting System Proposal
Introduction to Computers
Chapter 11 Supporting Printers and Scanners
Presentation transcript:

The Punchscan Voting System Refinement and System Design Rick Carback Kevin Fisher Sandi Lwin May 8, 2006

New and Significant Punchscan implementation with current technology –requirements of hardware and software –Verification of software Data flow Interfaces Security properties of the system

Outline Punchscan Revisited System Design Data Flow Hardware and Software Components Interfaces Security Properties Conclusion

Punchscan Revisited

Mark the hole with the character matching your choice. Split the two sheets. Scan one, shred one.

The Punchboard Before the election, tables are generated like the ones above.

The Punchboard Before the election, this is posted on the bulletin board. The grey boxes cover up how the ballots look and are decoded.

The Punchboard Next, the auditor chooses half the rows.

The Punchboard After the election, officials fill the tables and release receipt halves.

The Punchboard Auditors choose to reveal the left or right half of Decode.

System Design

Meet the Weebles!

Stage 1: Initialize Election

Stage 2: Pre-Election

Stage 3: Election Day

Stage 4: Post-Election

Data Flow

Hardware and Software

Ballot Authoring Software Operation –Defines how Ballot looks –Gives questions in required languages Low security –Works only with public data –Output independently verified on webserver –Access to webserver should be turned off after data is uploaded

Printer Must use secure paper Cannot keep ballot information –data fed to printer must also be destroyed/erased. Must fold the paper and punch the hole in the top page.

Scanner Must be properly calibrated Only sends positions to the web server, nothing else.

Shredder Must completely destroy the half of the ballot the voter discards –Crosscut shredder –Incinerator

Web Server Needs load balancing to avoid DoS Needs strict access controls – Essentially all the things you would do to secure any web server on the Internet Database should be protected Has implications to voter confidence…

Diskless Workstation Permutation generation Generate printable ballots Encrypted with printer’s key Ballot counting Software verification Boots and runs software from Linux Live CD Use hashing Computer with no hard drive Does not save data between meetings

Interfaces

XML USB SQL Queries

Security Properties

Subliminal Channels Scanner only records positions Social Engineering Simplicity is the Key Denial of Service Scanner Calibration Attack Destroy Vote before Scanning Phase Destroy equipment (scanner / Internet connection) Destroy paper ballots Spoil Punchboard Spoil Printed Materials

Future Work

Implement defined elements with modern hardware and software Expand security discussion into formal attack tree Invite discussion, analysis from e-voting community

The End