Internet Voting David Jefferson Compaq Systems Research Center 130 Lytton Ave. Palo Alto, CA 94301

Slides:



Advertisements
Similar presentations
I Think I Voted. E-voting vs. Democracy Prof. David L. Dill Department of Computer Science Stanford University
Advertisements

Security Controls and Systems in E-Commerce
Secret Ballot Receipts: True Voter Verifiable Elections Author: David Chaum Published: IEEE Security & Privacy Presenter: Adam Anthony.
Electronic Voting Systems
ETen E-Poll ID – Strasbourg COE meeting November, 2006 Slide 1 E-TEN E-POLL Project Electronic Polling System for Remote Operation Strasbourg.
Cryptographic Voting Protocols: A Systems Perspective Chris Karlof Naveen Sastry David Wagner UC-Berkeley Direct Recording Electronic voting machines (DREs)
Internet Voting Technology and policy issues. Selective History of Voting (US) early 1800’s: public oral voting at County Hall 1800’s: free-form, non-secret.
1 Voice over Internet Protocol (VoIP) Security Affects on the IP Network Architecture Conference ICS – Wireless Group Meeting Tempe, Arizona.
Cryptography and Network Security
Topic 8: Secure communication in mobile devices. Choice of secure communication protocols, leveraging SSL for remote authentication and using HTTPS for.
Computer and Network Security Mini Lecture by Milica Barjaktarovic.
1 COMPUTER SECURITY AND ETHICS Chapter Five. Computer Security Risks 2.
Election Observer Training 2008 Elections Certification & Training Program
The Punchscan Voting System Refinement and System Design Rick Carback Kevin Fisher Sandi Lwin May 8, 2006.
A Modular Voting Architecture (“Frogs”) Shuki Bruck (CalTech) David Jefferson (Compaq) Ronald L. Rivest (MIT) (WOTE, August 28, 2001)
Security Overview Hofstra University University College for Continuing Education - Advanced Java Programming Lecturer: Engin Yalt May 24, 2006.
1 An Overview of Computer Security computer security.
Internet Voting Technology and policy issues David Wagner UC Berkeley.
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
Electronic Voting (E-Voting) An introduction and review of technology Written By: Larry Brachfeld CS591, December 2010.
Internet Voting. What is Internet Voting? Internet voting is: an election process whereby people can cast their votes over the Internet, most likely through.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
Installing software on personal computer
Network Infrastructure Security. LAN Security Local area networks facilitate the storage and retrieval of programs and data used by a group of people.
Copyright Microsoft Corp Ramnish Singh IT Advisor Microsoft Corporation Secure Remote Access Challenges, Choices, Best Practices.
Ballot Processing Systems February, 2005 Submission to OASIS EML TC and True Vote Maryland by David RR Webber.
Alter – Information Systems 4th ed. © 2002 Prentice Hall 1 E-Business Security.
12/9-10/2009 TGDC Meeting TGDC Recommendations Research as requested by the EAC John P. Wack National Institute of Standards and Technology
Cryptology Digital Signatures and Digital Certificates Prof. David Singer Dept. of Mathematics Case Western Reserve University.
Introduction. computer Computers are information processing machines used in different departments and organizations. They can be connected all over the.
Requirements for Electronic and Internet Voting Systems in Public Elections David Jefferson Compaq Systems Research Center Palo Alto, CA
Securing Windows 7 Lesson 10. Objectives Understand authentication and authorization Configure password policies Secure Windows 7 using the Action Center.
An Internet Voting System Manager Yonghua Li Kansas State University October 19, 2001 MSE Project - Phase I.
PART THREE E-commerce in Action Norton University E-commerce in Action.
Electronic Voting Ronald L. Rivest MIT Laboratory for Computer Science.
1 The Evolution of Internet Voting By Ka Ling Cheung.
Caring for Technology Malware. Malware In this Topic we examine: v Viruses (or Malware) v Virus Detection Techniques v When a Virus is Detected v Updating.
BZUPAGES.COM. What is a VPN VPN is an acronym for Virtual Private Network. A VPN provides an encrypted and secure connection "tunnel" path from a user's.
Course code: ABI 204 Introduction to E-Commerce Chapter 5: Security Threats to Electronic Commerce AMA University 1.
Nathanael Paul CRyptography Applications Bistro February 3, 2004.
Electronic Voting: The 2004 Election and Beyond Prof. David L. Dill Department of Computer Science Stanford University
Online voting: a legal perspective
1 Class 15 System Security. Outline Security Threats (External: malware, spoofing/phishing, sniffing, & data theft: Internal: unauthorized data access,
Chapter 30 - Electronic Commerce and Business Introduction E-Commerce is Big Business –all commercial transactions conducted over the Internet shopping,
Final review Our final exam will be held on Wednesday, May 3rd from 4:00 to 5:50 in room 109 WWH.
SSL/TLS How to send your credit card number securely over the internet.
Internet Voting Ashok CS 395T. What is “E-voting” Thomas Edison received US patent number 90,646 for an electrographic vote recorder in Specific.
Secure Remote Electronic Voting CSE-681 Fall 2006 David Foster and Laura Stapleton Laura StapletonLaura Stapleton.
DHCP Vrushali sonar. Outline DHCP DHCPv6 Comparison Security issues Summary.
Computer and Network Security Brendan Duncombe Bahein Maung.
Election Assistance Commission 1 TGDC Meeting High Level VVSG Requirements: What do they look like? February, 09, United States.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
@Yuan Xue Case Study (Mid-term question) Bob sells BatLab Software License Alice buys BatLab Credit card information Number of.
Secure, verifiable online voting 29 th June 2016.
Securing Network Servers
State Board of Elections Computers
EVoting 23 October 2006.
How do Elections Work? Section 2 (pages ).
E-voting …and why it’s good..
A Modular Voting Architecture (“Frogs”)
Electronic Voting Machine Using MSP430 With Voice Feedback System
Electronic voting – safe or not?
Improving Reliability of Direct Recording Electronic Voting Systems
Explained That’s SB 286.
Goals Introduce the Windows Server 2003 family of operating systems
Cryptography and Network Security
ONLINE SECURE DATA SERVICE
Erica Burch Jesse Forrest
Cryptography and Network Security
Presentation transcript:

Internet Voting David Jefferson Compaq Systems Research Center 130 Lytton Ave. Palo Alto, CA

Classification of Internet Voting Systems Poll-site Internet voting –Election officials secure the client configuration –Voters identify themselves to officials Kiosk voting –Election officials secure the client configuration –Voters authenticate themselves to voting machine Remote voting –Voters or 3 rd parties control client configuration

Recommendations of CA and NSF panels Poll-site systems: Experimentation leading to certification can proceed cautiously Kiosk systems: Find consensus on best way to authenticate voters; then proceed as with poll-site systems. Remote voting systems: –Profound security problems with voting from unsecured platforms (i.e. conventional hardware + OS + browser): Trojan horse attacks (pre-existing or delivered by virus, etc.) Remote management software attacks Spoofing attacks Denial of service attacks Automated vote selling schemes –Large numbers of votes could be changed, discarded, spied upon, or bought/sold—undetectably—by anyone in the world. No fixes in sight. –Vast combinatorial space of platforms to support –Digital divide problem –Recommend indefinite delay in considering such systems.

Electronic systems will change rapidly Hardware Software  Changes to certification process recertification of systems put to other use continuous certification and decertification  Changes to “business model” capital purchase gives way to leasing, rental, financing, dual use, and other options  Changes to training and management

Ideas whose time has come Open specifications of interfaces and protocols –Allows interchangeable software parts Public source for election software –There should be no proprietary or secret code in the vote data path (but IP rights still protected) Universally verifiable cryptographic election protocols –Anyone can verify that the entire process, from just after the casting of votes, all the way to the output of the canvass, is conducted correctly, while still preserving privacy

Disadvantages of paper vs. electronic ballots Low reliability –Many more ways for voters to make errors –Paper ballots constitute a single point of failure if lost or damaged; cannot be “copied” without loss of fidelity –Just as much software required as in electronic voting (in scanners and printers) –Require human judgment to ascertain “voter intent” –Paper is essentially an analog medium Poor security –No checksums or encryption possible—data is non-redundant and in cleartext –Paper ballots can be manipulated by hand—no tools or skill required –Trojan horse argument not avoided--possible in printers, scanners, etc. Excessive costs –Printing –Mechanical paper-handling equipment (scanners, printers) required –Storage, transport, and storage again –Waste