1 / 26

Attacks on RFID-Based Electronic Voting Systems

Yossi Oren and Avishai Wool, . Attacks on RFID-Based Electronic Voting Systems. IEEE RFID’2010, Orlando FL. snipurl.com/e-voting. http://eprint.iacr.org/2009/422. Agenda. What’s the Israeli e-Voting Scheme? How can we break it cheaply and completely?. Not on the Agenda.

emile
Download Presentation

Attacks on RFID-Based Electronic Voting Systems

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Yossi Oren and Avishai Wool, Attacks on RFID-Based Electronic Voting Systems IEEE RFID’2010, Orlando FL snipurl.com/e-voting http://eprint.iacr.org/2009/422

  2. Agenda • What’s the Israeli e-Voting Scheme? • How can we break it cheaply and completely?

  3. Not on the Agenda • Why the new scheme is legally unsound • Why our (ex-)ministers are all corrupt • The biometric database

  4. Why do we have elections?

  5. Elections • What’s a good election scheme? • General • Free • Equal • Fair

  6. Preliminaries • Definition: An electionE is an NPelection, if… N P • Conjecture: An election is only secure if it is NP-secure • Claim: The Israeli Scheme is NP-insecure

  7. How Do We Vote Today? • Israel votes by national list proportional representation

  8. How Do We Vote Today? N P

  9. How Do We Vote Today? N N P

  10. How Do We Vote Today? • 72.1% participation rate • Less than 1.3% disqualified votes • (including protest “blank ballot” votes) • 99% final results 6 hours after poll closes • Public Trust N P

  11. How Will We Vote Tomorrow?

  12. Tomorrow’s Ballot

  13. How Will We Vote Tomorrow?

  14. How Will We Vote Tomorrow?

  15. How Will We Vote Tomorrow? N P N

  16. How Will We Vote Tomorrow? N P N

  17. Attacks on the Voting System • Relay Attacks • Ballot Sniffing • Single Dissident • Ballot Stuffing • Non-Relay Attacks • Zapper • Remote Jamming • Implementation Attacks • Relay Attacks • Ballot Sniffing • Single Dissident • Ballot Stuffing • Non-Relay Attacks • Zapper • Remote Jamming • Implementation Attacks

  18. Relay Attacks

  19. The Ballot Sniffing Attack N P N N N P P N N P P P P N N N N N N

  20. The Ballot Stuffing Attack P P N N P P P N P P P N N N P N P

  21. The Zapper Attack P P P P P P P P

  22. The Government’s Response…

  23. http://www.youtube.com/watch?v=wxd3-YodOmM

  24. Implementation Attacks • Session Hijacking • Replay Attacks • Semantic Insecurity • …

  25. Conclusion • Is the new e-voting scheme a good scheme? • General • Free • Equal • Fair • Is the new e-voting scheme a good scheme? • General • Free • Equal • Fair

  26. Thank You! snipurl.com/e-voting http://eprint.iacr.org/2009/422

More Related