[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: Thoughts on crypto vulnerability and voting systems
Team, Thoughts on exposure of hashing systems. Eg - a cracker can be assumed to have access to the generating SW - and probably the source code (especially if its a public mechanism or open source). So their challenge is to attack a reduced set of possibilities. Obviously the defense is that they do not know the original seed code sequence. What the hash system needs is to generate a diverse population of codes to avoid possiblility of sequences betraying the original sequence. The biggest threat is that they could then potentially alter votes without detection. Again - looking at the Trusted Voting Process - since the whole method does not rely on cryptography anywhere - if the crypto being used is compromised - it does not compromise the voting process pre-say. Eg - since there are four counts being cross-referenced - you need access to all four mechanisms to be able to change them consistently - otherwise one count will betray changes in another. 1) electoral roll counts 2) e-vote records 3) printer records (frog equivalents) 4) paper ballots and their scanned counts Seems like all exposing the hash scheme can do for you is allow you to see into anonymous voting records. Not very interesting! The other risk is disruption - deliberately altering part of the voting record in attempt to invalidate the whole election. The best defense is clearly if the attacker can gain little benefit from the attack - he will not bother with it in the first place! DW
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]