Page 94 - Towards Trustworthy Elections New Directions in Electronic Voting by Ed Gerck (auth.), David Chaum, Markus Jakobsson, Ronald L. Rivest, Peter Y. A. Ryan, Josh Benaloh, Miroslaw Kutylowski, Ben Adida ( (z-lib.org (1)
P. 94

J.A. Goler and E.J. Selker
                          86
                              Adversary Model
                          3
                               Unintentional Bugs and Physical Failures
                          3.1
                          On a systemwide basis, the largest likely contributor to failure in an electronic
                          voting system is the unintentional failure of one of the components in the system.
                          A monolithic system with one operating system, set of COTS (Common Off
                          The Shelf) hardware, communication mode and voting software will suffer a
                          catastrophic failure if a single component has a bug. While such failures may
                          not be common, having a common failure mode may cascade and could render
                          the entire system compromised. An example of such a large cascading failure is
                          the 2003 northeast power failure [1], which started at a single failure point and
                          affected the Eastern Seaboard, Midwest and Eastern Canada. In software, the
                          blaster worm [4], caused serious outages throughout the world. Having diversity
                          in the code of the voting system would help mitigate common failures and ensure
                          that the vote can be properly counted even if some modules are compromised.
                            One concern about the Internet is that electronic transmissions can be held up
                          or slowed down for one reason or another. A system that communicates electron-
                          ically can batch the communication for later transmission, use land telephone
                          lines to communicate the information, or use cell phones or satellite phones as
                          alternate communications modes to make communication reliable. SAVE mod-
                          ules utilize both encryption and cached data so that disruption or compromise
                          of the communication.
                            Additional hazards to the voting process include simple access to electronic
                          power, and problems in transmitting votes from the polling stations. The dangers
                          of power outages have successfully been addressed in Brazil where the computer-
                          based voting system relies on batteries that last 14 hours. The question of mes-
                          sages being intercepted is one of simple encryption; the issue of changed messages
                          would be dealt with using redundancy, cryptography and message authentication
                          codes (MACs) to ensure integrity.

                          3.2  Intentional Manipulations

                          There are four groups of actors that we surmise would be interested in compro-
                          mising the voting process.
                          The Evil Development Company. The danger of losing contracts due to
                             faulty equipment has been a constant concern of election technology com-
                             panies. They have small close-knit development organizations and review
                             their work together. These are all safeguards for their systems. Still, there is
                             concern that either as an individual or organization, the author of a voting
                             system might insert malicious code. This code could change votes, delay or
                             drop votes, or produce intentionally incorrect tallies. In addition, the code
                             could flood the rest of the system with invalid messages, damaging the per-
                             formance of the system. Finally, compromising elements such as specially
                             designed cryptographic code might be inserted to leak information about
   89   90   91   92   93   94   95   96   97   98   99