Page 21 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 21

The Witness-Voting System
                                                                                             13
                            We further distinguish interference with functional and performance influence
                          (hereafter called physical interference) from interference with environmental and
                          non-functional influence (hereafter called conceptual interference).
                            Conceptual interference must be observable in its effects but does not need
                          to exist physically; it may just stay as a threat. 18  Interference also presents
                          combined failure modes where an attack in one layer of the system can be used
                          to compromise another layer (e.g., a conceptual interference creating a physical
                          spurious change in the election outcome).
                            Our concept of interference captures any source that could perturb the election
                          outcome, including faults, attacks and threats by an adversary. 19
                            For example, passive eavesdropping on the voted ballot (e.g. by covertly moni-
                          toring the stray electromagnetic emissions from the computer screen used by the
                          voter) can enable coercion that may interfere with the election outcome. Yet if
                          performed from afar, undetectably and never overtly used to coerce or influence
                          voters, a passive attack such as eavesdropping can still be used to perturb the
                          election outcome (see footnote 7). In either case, passive eavesdropping can be
                          modeledas aninterference source interms of its influence on the output signal
                          (the received message; the election result).
                            Information Theory also includes the concept of interference, or noise,de-
                          fined as that which perturbs the signal. The usual case of interest is when the
                          signal does not always undergo the same change in transmission, when noise
                          may be considered a chance variable just as the message is considered. In gen-
                          eral, noise may be represented by a suitable stochastic process. However, it mat-
                          ters not whether noise always produces different changes in the received signal,
                          or where that change originates. A constant and 100% predictable radio signal
                          from an unknown source is also noise. Anything that interferes with the message
                          is noise.
                            We observe that interference (noise) in Information Theory corresponds to the
                          same concept defined here. As previously considered by us [16], the condition to
                          model attacks and faults as interference (noise) in a communication system is the
                          same one that already exists in Information Theory, namely, noise is anything
                          that interferes with the message.
                            In describing interference sources and prevention, it is customary to define
                          boundaries or spheres of influence. A first boundary comprises the voting means.
                          18  This is well-known to chess players, where perceived threats can be more effective to
                            change a game than actually carrying out an attack. A voter who fears that an attack
                            can reveal her choices, with unpleasant consequences, may not vote as intended even
                            if there is no such attack.
                          19
                            Including, for example, the influence of ambiguous ballot design, incorrect touch
                            screen coordinates, transmission and reception errors, faults, malfunctions, virus,
                            bugs, buffer overflow, dormant or hidden code, alpha particle memory corruption,
                            covert microcode, covert channels, human error, collusion, coercion, blackmail, finan-
                            cial kickbacks, fraud and any passive or active interference attempt by adversaries.
                            This may also include man-in-the-middle, eavesdropping, replay, impersonation,
                            forgery, and any other attacks by an adversary. Attacks may also adapt to defenses,
                            either automatically or driven by an intelligent source [16].
   16   17   18   19   20   21   22   23   24   25   26