Electronic Voting Network Security 1 Edward Bigos George Duval D. Seth Hunter Katie Schroth.

Slides:



Advertisements
Similar presentations
Secret Ballot Receipts: True Voter Verifiable Elections Author: David Chaum Published: IEEE Security & Privacy Presenter: Adam Anthony.
Advertisements

Electronic Voting Systems
Spring 2000CS 4611 Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Requirements for a Secure Voting System  Only authorized voters can vote  No one can vote more than once  No one can determine for whom anyone else.
ETen E-Poll ID – Strasbourg COE meeting November, 2006 Slide 1 E-TEN E-POLL Project Electronic Polling System for Remote Operation Strasbourg.
1 Network Security Outline Encryption Algorithms Authentication Protocols Message Integrity Protocols Key Distribution Firewalls.
Transport Layer Security (TLS) Protocol Introduction to networks and communications(CS555) Prof : Dr Kurt maly Student:Abhinav y.
CMSC 414 Computer and Network Security Lecture 10 Jonathan Katz.
Analysis of an Electronic Voting System
By Varun Jain. Introduction  Florida 2000 election fiasco, drew conclusion that paper ballots couldn’t be counted  Computerized voting system, DRE (Direct.
CMSC 414 Computer and Network Security Lecture 11 Jonathan Katz.
1 J. Alex Halderman Security Failures in Electronic Voting Machines Ariel Feldman Alex Halderman Edward Felten Center for Information Technology Policy.
1 MD5 Cracking One way hash. Used in online passwords and file verification.
How secure are b Wireless Networks? By Ilian Emmons University of San Diego.
Security Controls – What Works
Chapter 17 Controls and Security Measures
Software Security Threats Threats have been an issue since computers began to be used widely by the general public.
1 Enhancing Wireless Security with WPA CS-265 Project Section: 2 (11:30 – 12:20) Shefali Jariwala Student ID
Voting Machine Technology Tom Trumpbour Computer Software Consultant United States.
Wired Equivalent Privacy (WEP)
Security in Wireless LAN Layla Pezeshkmehr CS 265 Fall 2003-SJSU Dr.Mark Stamp.
Vulnerability In Wi-Fi By Angus U CS 265 Section 2 Instructor: Mark Stamp.
Copyright © Clifford Neuman - UNIVERSITY OF SOUTHERN CALIFORNIA - INFORMATION SCIENCES INSTITUTE USC CSci530 Computer Security Systems Lecture.
Securing Data Storage Protecting Data at Rest Advanced Systems Group Dell Computer Asia Ltd.
CMSC 414 Computer and Network Security Lecture 8 Jonathan Katz.
ISA 3200 NETWORK SECURITY Chapter 10: Authenticating Users.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Electronic Voting Linh Nguyen. Electronic Voting  Voting Technologies  The Florida 2000 Election  Direct Recording Electronic Devices (DREs)‏ - Diebold.
17-803/ ELECTRONIC VOTING FALL 2004 COPYRIGHT © 2004 MICHAEL I. SHAMOS / Electronic Voting Session 6: The Diebold Reports Michael I.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 10 Authenticating Users By Whitman, Mattord, & Austin© 2008 Course Technology.
Beyond HIPAA, Protecting Data Key Points from the HIPAA Security Rule.
Wireless Security Issues David E. Hudak, Ph.D. Senior Software Architect Karlnet, Inc.
United States Election Assistance Commission Pilot Program Testing and Certification Manual & UOCAVA Pilot Program Testing and Certification Manual & UOCAVA.
Chapter 8.  Cryptography is the science of keeping information secure in terms of confidentiality and integrity.  Cryptography is also referred to as.
Voting System Qualification How it happens and why.
TESTING THE SECRUITY OF ELECTRONIC VOTING SYSTEM Presented By: NIPUN NANDA
Data and Applications Security Secure Electronic Voting Machines Lecture #30 Dr. Bhavani Thuraisingham The University of Texas at Dallas April 23, 2008.
Cryptographic Voting Protocols: A Systems Perspective By Chris Karlof, Naveen Sastry, and David Wagner University of California, Berkely Proceedings of.
Demystifying the Independent Test Authority (ITA)
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Lesson 20-Wireless Security. Overview Introduction to wireless networks. Understanding current wireless technology. Understanding wireless security issues.
Environment for Information Security n Distributed computing n Decentralization of IS function n Outsourcing.
Digital Democracy: A look at Voting Machines Presented by Justin Dugger April 2003.
Secretary of State Voting System Security Standards Juanita Woods Secretary of State Elections Division HAVA Information Security.
Georgia Electronic Voting System Testing and Security Voting Systems Testing Summit November 29, 2005.
WEP Protocol Weaknesses and Vulnerabilities
Evoting using collaborative clustering Justin Gray Osama Khaleel Joey LaConte Frank Watson.
From Coulouris, Dollimore, Kindberg and Blair Distributed Systems: Concepts and Design Edition 5, © Addison-Wesley 2012 Exercises for Chapter 11: Security.
How and what to observe in e-enabled elections Presentation by Mats Lindberg, Election Adviser, Organisation for Security and Co-operation in Europe (OSCE)
Lecture 24 Wireless Network Security
Oct 15-17, : Integratability and Data Export Page 1Next VVSG Training Voting devices must speak (produce records) using a commonly understood language,
Against E-Voting Ryan Egan, Amber Jones, Alyssa Sankin, Page Stephens, Amber Straight, Philip Sugg, and Diana Troisi Direct recording electronic (DRE)
IT Security Policy: Case Study March 2008 Copyright , All Rights Reserved.
Lesson 10: Configuring Network Settings MOAC : Configuring Windows 8.1.
Wireless Security Rick Anderson Pat Demko. Wireless Medium Open medium Broadcast in every direction Anyone within range can listen in No Privacy Weak.
Electronic Voting: Danger and Opportunity
Wired Equivalent Privacy (WEP) Chris Overcash. Contents What is WEP? What is WEP? How is it implemented? How is it implemented? Why is it insecure? Why.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
WLAN Security1 Security of WLAN Máté Szalay
Information Systems Design and Development Security Precautions Computing Science.
@Yuan Xue 285: Network Security CS 285 Network Security Message Authentication Code Data integrity + Source authentication.
Secure, verifiable online voting 29 th June 2016.
Vulnerability Assessment Sequoia Voting Systems October 10, 2006.
EVoting 23 October 2006.
WEP & WPA Mandy Kershishnik.
Con Electronic Voting Preston Pope, Zach White, Ankit Shrivastava, Max Alexander.
Election Security Best Practices
Election Security Best Practices
Presentation transcript:

Electronic Voting Network Security 1 Edward Bigos George Duval D. Seth Hunter Katie Schroth

Electronic Voting Network Security 2 Outline Introduction & Overview Network Definition Funding & Certification Security Concerns Recommendations Conclusion

Electronic Voting Network Security 3 Introduction Election security is a historic concern –Decides who has power and control –Often a heavily distributed process –Ancient Greeks cast secret, fully-auditable ballots Several important components –Anonymity of votes –Authentication of voters –Integrity of votes –Result tampering –Result validation

Electronic Voting Network Security 4 Overview First nationwide attempt at electronic voting in 2004 Presidential Election –PC-based DRE Voting Machines and Central Tabulators Network security concerns exist at the Central Tabulators and their links to voting machines –Network capability just as important as actual usage Disclaimer: NOT a political argument –Election security in a modern context –Recent election chosen solely because it was the first large- scale rollout of such technology

Electronic Voting Network Security 5 Network Definition ‘Legacy’ voting machines –Punch card readers –Optical scanners Direct Recording Electronic (DRE) machines –AccuVote-TS Central Tabulators –Diebold GEMS Network capabilities –Ethernet NIC –Dial-up modem – commonly used. –Occasionally, wireless NIC! –Little to no protection, and enabled by default.

Electronic Voting Network Security 6 Funding And Certification of E-voting systems

Electronic Voting Network Security 7 Significance Need to determine How and Where the money comes from to upgrade the voting systems. Who and What establishes the Standard that the new machines are tested against

Electronic Voting Network Security 8 HAVA, NASED and the ITA Help America Vote Act (HAVA) –Formed from the Federal elections commission to funnel funds to upgrade voting equipment National Association of State Election Directors (NASED) –Formed out of the Election Assistance Commission to help standardize the evaluation of Equipment Independent Testing Authorities (ITA) –“Specialists” hired to test the HW and SW of the new Electronic Voting Equipment.

Electronic Voting Network Security 9 Independent Testing Authorities Pot-holes in the system Wyle Labs were used for the HW testing –Left security to be tested by the manufacturer Ciber Inc Hired to test SW –Penetration and security tests “Not Applicable”

Electronic Voting Network Security 10 Integrity and Security Concerns Vote Integrity –Entry point Problems: Punch Cards, Optical Scanners and DREs Rogue Voting Machines –Vulnerable to malicious attacks like: Network Access, Authentication, Man-in-the-Middle, Desynchronization Eavesdropping –Line taps, Packet sniffing and Man-In-The-Middle Result Tampering

Electronic Voting Network Security 11 Hypothetical Tampering Tampering with out notice Point of Entry : National Election Poll –Assume a direct link to the Central Tabulators are accessible to NEP workers Gains Access to the network Accesses the Database Likely Suspects: –NEP poll worker or a Technician familiar with the manufacturing of the voting equipment

Electronic Voting Network Security 12 Security of Electronic Voting

Electronic Voting Network Security 13 Notable Security Reviews Hopkins Report –Review of voting terminal security. SAIC Report –Management controls RABA Report –Actual security tests.

Electronic Voting Network Security 14 Hopkins Report In depth review of C++ source code left on an open Diebold FTP server. Suggested several potential attacks. “cryptography, when used at all, is used incorrectly” –Hard coded encryption key = F2654hD4. Same since 1998 ! –“Even unsophisticated attackers can perform ‘untraceable’ man-in-the-middle attacks.”

Electronic Voting Network Security 15 Key Points from the Hopkins Report Key Management –a hard coded key: #define DESKEY ((des_key*)"F2654hD4") Encryption –implementation always uses zero for its IV. DesCBCEncrypt((des_c_block*)tmp, (des_c_block*)record.m_Data, totalSize, DESKEY, NULL, DES_ENCRYPT); Message Authentication –16-bit CRC of the plaintext data is an un-keyed public function –CRC is stored with the Cipher text in the file and read whenever its decrypted and verified. –Problem is that the cipher text shouldn’t be stored with the CRC in an unencrypted form.

Electronic Voting Network Security 16 SAIC Report Management and policy, not a technical review. Commissioned by MD Governor Ehrlic. –Suggested the use of controls & “tamper tape”. “Dr Rubin did not have a complete understanding of Maryland’s implementation, process, controls and environment.” Conclusion: Systems at high risk, but risk could be mitigated by management controls.

Electronic Voting Network Security 17 RABA Report Reviewed & critiqued the Hopkins & SAIC. –Hopkins report substantially correct. –Agrees with the evaluation that the election station software code quality is poor. RED TEAM laboratory exercise. –Used current Diebold source and actual AccuVote-TS hardware (January 2004). –Poor security related to DES key (F2654hD4) and administrative password (1111) still unchanged in newest versions.

Electronic Voting Network Security 18 Recommendations

Electronic Voting Network Security 19 Plug Most Severe Network Security Vulnerabilities DRE Voting Machines –Mandatory paper ballot receipts Ensuring that a proper recount can be conducted Finding a compromised DRE does not mean lost votes Central Tabulators –Open Source Code Eliminating the need for ITAs Ensuring secure software solutions

Electronic Voting Network Security 20 Policies & Regulations Audit Reform –Require a standard for recognizing the need for a recount Prohibit Direct Feeds into Central Tabulators –Only as strong as the weakest link –Other network feeds increases vulnerability

Electronic Voting Network Security 21 Conclusions Defined the system components of the election network Discussed financing and certification Explained network security concerns for the system components Suggested first steps to improving network security

Electronic Voting Network Security 22 Backup

Electronic Voting Network Security 23 Key Management Code snippet reveals a hard coded key: –#define DESKEY ((des_key*)"F2654hD4")[1][1] [1] Kohno, Stubblefield, Rubin, Wallach. “Analysis of an Electronic Voting System.” IEEE Symposium on Security and Privacy IEEE Computer Society Press, May 2004.

Electronic Voting Network Security 24 Encryption Another code sample of the GEMS software source code shows that the implementation always uses zero for its IV. –DesCBCEncrypt((des_c_block*)tmp, (des_c_block*)record.m_Data, totalSize, –DESKEY, NULL, DES_ENCRYPT);11 A Null in the argument forces the DesCBCEncrypt to use all zeros. “strong” random numbers are required for each encryption of CBC mode.

Electronic Voting Network Security 25 Message Authentication 16-bit CRC of the plaintext data is an un-keyed public function CRC is stored with the Cipher text in the file and read whenever its decrypted and verified. Problem is that the cipher text shouldn’t be stored with the CRC in an unencrypted form. –Better to first encrypt the data to be stored and then to compute a keyed cryptographic checksum of the cipher text. –The checksum could then be used to detect any tampering with the plaintext. –Since each entry has a timestamp, it can be used to detect reordering