Lecture 1 - Voting As A Security Problem
Lecture 1 - Voting As A Security Problem
J. Alex Halderman
University of Michigan
1.1 Welcome Securing Digital Democracy
Welcome!
1.1 Welcome Securing Digital Democracy
1.1 Welcome Securing Digital Democracy
1.1 Welcome Securing Digital Democracy
1.1 Welcome Securing Digital Democracy
Syllabus
1. Voting as a Security Problem
2. How We Got Here
3. Computers at the Polls
4. Problems with DREs
5. Security Procedures
6. E-Voting around the World
7. Human Factors
8. Internet Voting
9. Using Technology Wisely
10. E-Voting and Public Policy
1.2 The Security Mindset Securing Digital Democracy
The Adversary
Computer security studies how
systems behave in the presence
of an adversary .
“The adversary”
a.k.a. “the attacker”
a.k.a. “the bad guy”
1.2 The Security Mindset Securing Digital Democracy
Available in advance.
Closed book, closed notes.
Thinking as a Defender
Security policy
– What are we trying to protect?
– What properties are we trying to enforce?
Threat model
– Who are the attackers? Capabilities? Motivations?
– What kind of attack are we trying to prevent?
Risk assessment
– What are the weaknesses of the system? Challenge is to think
– What will successful attacks cost us? rationally and
– How likely?
rigorously about risk.
Countermeasures
– Costs vs. benefits?
Rational paranoia.
– Technical vs. nontechnical?
1.3 Security Requirements for Voting Securing Digital Democracy
Integrity
The outcome matches voter intent.
Integrity
Weak form:
Ballot Secrecy
Nobody can figure out how you voted…
Strong form:
…even if you try to prove it to them.
1.3 Security Requirements for Voting Securing Digital Democracy
Integrity
Only authorized voters can cast votes,
Ballot Secrecy
and
Voter Authentication
each voter can only vote up to the
permitted number of times.
1.3 Security Requirements for Voting Securing Digital Democracy
Integrity
All authorized voters have the
opportunity to vote. Ballot Secrecy
Voter Authentication
Enfranchisement
1.3 Security Requirements for Voting Securing Digital Democracy
Integrity
The election system is able to accept all
votes on schedule and produce results in Ballot Secrecy
a timely manner. Voter Authentication
Enfranchisement
Availability
1.3 Security Requirements for Voting Securing Digital Democracy
Voter
Enfranchisement
Authentication
1.3 Security Requirements for Voting Securing Digital Democracy
Enfranchisement Convenience
Availability Intelligibility
Securing Digital Democracy
Lecture 1 | Voting as a Security Problem
J. Alex Halderman
University of Michigan