1 / 22

Attacking the Israeli e-Voting System

Explore vulnerabilities in the Israeli e-Voting system, including relay attacks and ballot sniffing, and discuss the effectiveness of the new scheme. Learn about the importance of secure and fair elections.

haroldb
Download Presentation

Attacking the Israeli e-Voting System

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Yossi Oren and Avishai Wool, ציון אקדמי, September 2009 Attacking the Israeli e-Voting System snipurl.com/e-voting http://eprint.iacr.org/2009/422

  2. Agenda • What’s the Israeli e-Voting Scheme? • How can we break it cheaply and completely?

  3. Not on the Agenda • Why the new scheme is legally unsound • Why our (ex-)ministers are all corrupt • The biometric database

  4. Elections • Why do we have elections? • What’s a good election scheme? • General • Free • Equal • Fair

  5. Preliminaries • Definition: An electionE is an NPelection, if… N P

  6. How Do We Vote Today? N P

  7. How Do We Vote Today? N N P

  8. How Do We Vote Today? N P

  9. How Will We Vote Tomorrow?

  10. Tomorrow’s Ballot

  11. How Will We Vote Tomorrow?

  12. How Will We Vote Tomorrow?

  13. How Will We Vote Tomorrow? N P N

  14. How Will We Vote Tomorrow? N P N

  15. Relay Attacks

  16. Attacks on the Voting System • Relay Attacks • Ballot Sniffing • Single Dissident • Ballot Stuffing • Non-Relay Attacks • Zapper • Remote Jamming • Implementation Attacks • Relay Attacks • Ballot Sniffing • Single Dissident • Ballot Stuffing • Non-Relay Attacks • Zapper • Remote Jamming • Implementation Attacks

  17. The Ballot Sniffing Attack N P N N N P P N N P P P P N N N N N N

  18. The Ballot Stuffing Attack P P N N P P P N P P P N N N P N P

  19. The Zapper Attack P P P P P P P P

  20. Implementation Attacks • Session Hijacking • Replay Attacks • Semantic Insecurity • …

  21. Conclusion • Is the new e-voting scheme a good scheme? • General • Free • Equal • Fair • Is the new e-voting scheme a good scheme? • General • Free • Equal • Fair

  22. Thank You! snipurl.com/e-voting http://eprint.iacr.org/2009/422

More Related