Internet VotingSeriously?? Ronald L. Rivest Institute Professor - - PowerPoint PPT Presentation

internet voting seriously
SMART_READER_LITE
LIVE PREVIEW

Internet VotingSeriously?? Ronald L. Rivest Institute Professor - - PowerPoint PPT Presentation

Internet VotingSeriously?? Ronald L. Rivest Institute Professor MIT, Cambridge, MA EVN Conference 2016-03-11 Outline Introduction Technology evolution and voting Internet voting Security Risk assessment New tech for old applications


slide-1
SLIDE 1

Internet Voting–Seriously??

Ronald L. Rivest

Institute Professor MIT, Cambridge, MA

EVN Conference 2016-03-11

slide-2
SLIDE 2

Outline

Introduction Technology evolution and voting Internet voting Security Risk assessment

slide-3
SLIDE 3

New tech for old applications One often asks if new technology can improve existing applications...

slide-4
SLIDE 4

New tech for old applications One often asks if new technology can improve existing applications... Example: punch cards for voting Step forward... or a mistake?

slide-5
SLIDE 5

Sometimes new tech helps

slide-6
SLIDE 6

Sometimes new tech helps Electric motors → elevators → tall buildings.

slide-7
SLIDE 7

Sometimes it doesn’t, or is silly.

slide-8
SLIDE 8

Sometimes it doesn’t, or is silly.

slide-9
SLIDE 9

Sometimes it is too dangerous for some uses!

slide-10
SLIDE 10

Sometimes it is too dangerous for some uses! (Don’t text while driving!)

slide-11
SLIDE 11

Can using the Internet help elections & voting? Yes, in many ways it can be helpful:

◮ Distributing information about an election

and choices.

slide-12
SLIDE 12

Can using the Internet help elections & voting? Yes, in many ways it can be helpful:

◮ Distributing information about an election

and choices.

◮ Allowing voters to update their personal

information.

slide-13
SLIDE 13

Can using the Internet help elections & voting? Yes, in many ways it can be helpful:

◮ Distributing information about an election

and choices.

◮ Allowing voters to update their personal

information.

◮ Providing information about election results.

slide-14
SLIDE 14

Can using the Internet help elections & voting? Yes, in many ways it can be helpful:

◮ Distributing information about an election

and choices.

◮ Allowing voters to update their personal

information.

◮ Providing information about election results. ◮ Providing information about audit of election

results...

slide-15
SLIDE 15

Can using the Internet help elections & voting? Yes, in many ways it can be helpful:

◮ Distributing information about an election

and choices.

◮ Allowing voters to update their personal

information.

◮ Providing information about election results. ◮ Providing information about audit of election

results...

◮ ...

slide-16
SLIDE 16

Can using the Internet help elections & voting? Yes, in many ways it can be helpful:

◮ Distributing information about an election

and choices.

◮ Allowing voters to update their personal

information.

◮ Providing information about election results. ◮ Providing information about audit of election

results...

◮ ...

slide-17
SLIDE 17

Can using the Internet help elections & voting? Yes, in many ways it can be helpful:

◮ Distributing information about an election

and choices.

◮ Allowing voters to update their personal

information.

◮ Providing information about election results. ◮ Providing information about audit of election

results...

◮ ...

But... actually voting over the Internet????

slide-18
SLIDE 18

What is “Internet Voting (IV)”? Internet voting is a form of remote voting. Remote voting has many flavors:

◮ Ballots sent to voter by: mail | web | email ◮ Ballots are: paper | electronic | both ◮ Voters are: supervised | unsupervised ◮ Ballot “marked” by: voter | kiosk | voter PC ◮ Ballots returned by: mail | web | email ◮ Auditing: none | moderate | comprehensive

slide-19
SLIDE 19

What is “Internet Voting (IV)”? Internet voting is a form of remote voting. Internet voting:

◮ Ballots sent to voter by: mail | web | email ◮ Ballots are: paper | electronic | both ◮ Voters are: supervised | unsupervised ◮ Ballot “marked” by: voter | kiosk | voter PC ◮ Ballots returned by: mail | web | email ◮ Auditing: none | moderate | comprehensive

slide-20
SLIDE 20

IV Proponents suggest IV would help:

slide-21
SLIDE 21

IV Proponents suggest IV would help:

◮ High-tech “buzz”?

slide-22
SLIDE 22

IV Proponents suggest IV would help:

◮ High-tech “buzz”? ◮ Extend franchise to military & disabled?

slide-23
SLIDE 23

IV Proponents suggest IV would help:

◮ High-tech “buzz”? ◮ Extend franchise to military & disabled? ◮ Turnout?

slide-24
SLIDE 24

IV Proponents suggest IV would help:

◮ High-tech “buzz”? ◮ Extend franchise to military & disabled? ◮ Turnout? ◮ Cost?

slide-25
SLIDE 25

IV Proponents suggest IV would help:

◮ High-tech “buzz”? ◮ Extend franchise to military & disabled? ◮ Turnout? ◮ Cost? ◮ Security?

slide-26
SLIDE 26

IV Proponents suggest IV would help:

◮ High-tech “buzz”? A+ ◮ Extend franchise to military & disabled? ◮ Turnout? ◮ Cost? ◮ Security?

slide-27
SLIDE 27

IV Proponents suggest IV would help:

◮ High-tech “buzz”? A+ ◮ Extend franchise to military & disabled? B ◮ Turnout? ◮ Cost? ◮ Security?

slide-28
SLIDE 28

IV Proponents suggest IV would help:

◮ High-tech “buzz”? A+ ◮ Extend franchise to military & disabled? B ◮ Turnout? C ◮ Cost? ◮ Security?

slide-29
SLIDE 29

IV Proponents suggest IV would help:

◮ High-tech “buzz”? A+ ◮ Extend franchise to military & disabled? B ◮ Turnout? C ◮ Cost? D ◮ Security?

slide-30
SLIDE 30

IV Proponents suggest IV would help:

◮ High-tech “buzz”? A+ ◮ Extend franchise to military & disabled? B ◮ Turnout? C ◮ Cost? D ◮ Security? F

slide-31
SLIDE 31

Voting must work in an adversarial environment

◮ Q: If we can put a man on the moon, why

can’t we make online voting work?

slide-32
SLIDE 32

Voting must work in an adversarial environment

◮ Q: If we can put a man on the moon, why

can’t we make online voting work?

◮ A: Because voting must work in an

adversarial environment. You wouldn’t get a man on the moon if people were trying to sabotage the launch and shooting at the rocket.

slide-33
SLIDE 33

Voting must work in an adversarial environment

◮ Q: If we can put a man on the moon, why

can’t we make online voting work?

◮ A: Because voting must work in an

adversarial environment. You wouldn’t get a man on the moon if people were trying to sabotage the launch and shooting at the rocket.

◮ Note: Adversaries may be outsiders, or

  • insiders. A foreign nation-state is a likely

adversary.

slide-34
SLIDE 34

Voting must provide a secret ballot

◮ Q: If we can bank online, why can’t we make

  • nline voting work?
slide-35
SLIDE 35

Voting must provide a secret ballot

◮ Q: If we can bank online, why can’t we make

  • nline voting work?

◮ A: Banking is not anonymous, so you can

have identifiable receipts. Furthermore you can “undo” a bad banking transaction. Finally, bankers spend lots of money on security.

slide-36
SLIDE 36

Online voting security is an unsolved problem

◮ Q: Do we know how, even in theory, to make

  • nline voting secure?
slide-37
SLIDE 37

Online voting security is an unsolved problem

◮ Q: Do we know how, even in theory, to make

  • nline voting secure?

◮ A: No. Not even close.

slide-38
SLIDE 38

Online voting security is an unsolved problem

◮ Q: Do we know how, even in theory, to make

  • nline voting secure?

◮ A: No. Not even close.

slide-39
SLIDE 39

Online voting security is an unsolved problem

◮ Q: Do we know how, even in theory, to make

  • nline voting secure?

◮ A: No. Not even close.

NIST: “additional research and development is needed to overcome these challenges before secure Internet voting will be feasible.” (No timeframe provided. No existing standards for IV.)

◮ NIST is being diplomatic. Secure Internet

voting may in fact be an unsolvable problem.

slide-40
SLIDE 40

Some may say “Adversary won’t attack”

slide-41
SLIDE 41

The Internet is a war zone. Casualties are mounting.

◮ Easy challenge: Pick a random month within

the last couple of years. Find a major company that was seriously hacked that month, which is bigger than all of the voting system vendors put together.

slide-42
SLIDE 42

The Internet is a war zone. Casualties are mounting.

◮ Easy challenge: Pick a random month within

the last couple of years. Find a major company that was seriously hacked that month, which is bigger than all of the voting system vendors put together.

◮ Home Depot ($83B revenues in 2015) was

hacked in 2014, disclosing 56 million credit card numbers. This week they agreed to pay $19M in fines; they expect to lose as much as $160M via lawsuits.

slide-43
SLIDE 43

Attackers are getting stronger and winning.

◮ “Advanced Persistent Threats”—Adversary

keeps working on a company until it finds a “way in” to its systems.

slide-44
SLIDE 44

Attackers are getting stronger and winning.

◮ “Advanced Persistent Threats”—Adversary

keeps working on a company until it finds a “way in” to its systems.

◮ Almost always succeeds, eventually.

slide-45
SLIDE 45

Attackers are getting stronger and winning.

◮ “Advanced Persistent Threats”—Adversary

keeps working on a company until it finds a “way in” to its systems.

◮ Almost always succeeds, eventually. ◮ Recently Juniper Systems ($4B revenue

2014) found its source code had been hacked by unknown parties, leaving a “backdoor”.

slide-46
SLIDE 46

Attackers are getting stronger and winning.

◮ “Advanced Persistent Threats”—Adversary

keeps working on a company until it finds a “way in” to its systems.

◮ Almost always succeeds, eventually. ◮ Recently Juniper Systems ($4B revenue

2014) found its source code had been hacked by unknown parties, leaving a “backdoor”.

◮ It may be months or years (average around

18 months) before a company even realizes it has been hacked.

slide-47
SLIDE 47

Sea change in security world assumptions

◮ The standard assumption used to be:

slide-48
SLIDE 48

Sea change in security world assumptions

◮ The standard assumption used to be:

With good design and careful implementation, you can prevent security problems.

slide-49
SLIDE 49

Sea change in security world assumptions

◮ The standard assumption used to be:

With good design and careful implementation, you can prevent security problems.

◮ Now the standard working assumption is

more realistic/pessimistic:

slide-50
SLIDE 50

Sea change in security world assumptions

◮ The standard assumption used to be:

With good design and careful implementation, you can prevent security problems.

◮ Now the standard working assumption is

more realistic/pessimistic: If you are online, you will be hacked (or already have been). “Assume the breach.” Can you deal with it? Or even detect it?

slide-51
SLIDE 51

Defenders are very weak in this space.

◮ Voting system vendors don’t even show up

at major security conferences! (Last week RSA Conference had 40,000 attendees and 500 vendors...)

slide-52
SLIDE 52

Defenders are very weak in this space.

◮ Voting system vendors don’t even show up

at major security conferences! (Last week RSA Conference had 40,000 attendees and 500 vendors...)

◮ I don’t even know any cryptographers that

work at a voting system vendor!

slide-53
SLIDE 53

Defenders are very weak in this space.

◮ Voting system vendors don’t even show up

at major security conferences! (Last week RSA Conference had 40,000 attendees and 500 vendors...)

◮ I don’t even know any cryptographers that

work at a voting system vendor!

◮ Security budgets for most election

jurisdictions are miniscule.

slide-54
SLIDE 54

Internet voting is “proxy voting”.

◮ With proxy voting, a voter asks a proxy

(person or perhaps a machine) to vote for her, following voter’s requested choices.

slide-55
SLIDE 55

Internet voting is “proxy voting”.

◮ With proxy voting, a voter asks a proxy

(person or perhaps a machine) to vote for her, following voter’s requested choices.

◮ Several countries use proxy voting, a proxy

(person) can vote for at most a small number (e.g. 4) of voters.

slide-56
SLIDE 56

Internet voting is “proxy voting”.

◮ With proxy voting, a voter asks a proxy

(person or perhaps a machine) to vote for her, following voter’s requested choices.

◮ Several countries use proxy voting, a proxy

(person) can vote for at most a small number (e.g. 4) of voters.

◮ With IV, you are asking a machine or online

server to be your “proxy voter” and vote for you.

slide-57
SLIDE 57

Internet voting is “proxy voting”.

◮ With proxy voting, a voter asks a proxy

(person or perhaps a machine) to vote for her, following voter’s requested choices.

◮ Several countries use proxy voting, a proxy

(person) can vote for at most a small number (e.g. 4) of voters.

◮ With IV, you are asking a machine or online

server to be your “proxy voter” and vote for you.

◮ If one machine proxies for millions of voters,

you have a large risk if proxy is hacked. (And as we saw, we should assume that server has been hacked!)

slide-58
SLIDE 58

Remote voting already has known security problems

◮ Unsupervised remote voting vulnerable to

vote-selling, bribery, and coercion.

slide-59
SLIDE 59

Internet voting has additional security problems

◮ Malware (both server and client).

slide-60
SLIDE 60

Internet voting has additional security problems

◮ Malware (both server and client). ◮ Network may be unreliable/manipulable.

DOS attacks can selectively kill voting in selected jurisdictions.

slide-61
SLIDE 61

Internet voting has additional security problems

◮ Malware (both server and client). ◮ Network may be unreliable/manipulable.

DOS attacks can selectively kill voting in selected jurisdictions.

◮ Strong voter authentication methods lacking.

slide-62
SLIDE 62

Internet voting has additional security problems

◮ Malware (both server and client). ◮ Network may be unreliable/manipulable.

DOS attacks can selectively kill voting in selected jurisdictions.

◮ Strong voter authentication methods lacking. ◮ Every software system has yet-to-be

discovered vulnerabilities (“0-days”).

slide-63
SLIDE 63

Internet voting has additional security problems

◮ Malware (both server and client). ◮ Network may be unreliable/manipulable.

DOS attacks can selectively kill voting in selected jurisdictions.

◮ Strong voter authentication methods lacking. ◮ Every software system has yet-to-be

discovered vulnerabilities (“0-days”).

◮ Attacks can be automated, executed on a

massive scale, and done so anonymously. Including automated vote-buying schemes.

slide-64
SLIDE 64

Internet voting has additional security problems

◮ Malware (both server and client). ◮ Network may be unreliable/manipulable.

DOS attacks can selectively kill voting in selected jurisdictions.

◮ Strong voter authentication methods lacking. ◮ Every software system has yet-to-be

discovered vulnerabilities (“0-days”).

◮ Attacks can be automated, executed on a

massive scale, and done so anonymously. Including automated vote-buying schemes.

◮ ...

slide-65
SLIDE 65

Auditable elections

◮ An election system must produce not only

the correct outcome, but also an auditable evidence trail sufficient to convince even the most skeptical loser that she lost fair and square.

slide-66
SLIDE 66

Auditable elections

◮ An election system must produce not only

the correct outcome, but also an auditable evidence trail sufficient to convince even the most skeptical loser that she lost fair and square.

◮ The audit should be “software independent”

and not assume that the election system software has behaved correctly. (It may have been hacked.)

slide-67
SLIDE 67

Auditable elections

◮ An election system must produce not only

the correct outcome, but also an auditable evidence trail sufficient to convince even the most skeptical loser that she lost fair and square.

◮ The audit should be “software independent”

and not assume that the election system software has behaved correctly. (It may have been hacked.)

◮ Paper ballots and “end-to-end verifiable

audit logs” are two useful evidence-producing methods.

slide-68
SLIDE 68

Can we make IV secure?

◮ We do not currently have the technology to

make internet voting secure (and may never).

slide-69
SLIDE 69

Can we make IV secure?

◮ We do not currently have the technology to

make internet voting secure (and may never).

◮ We can’t make such technology appear by

wishful thinking, just trying hard, making analogies with other fields, or running pilots.

slide-70
SLIDE 70

Can we make IV secure?

◮ We do not currently have the technology to

make internet voting secure (and may never).

◮ We can’t make such technology appear by

wishful thinking, just trying hard, making analogies with other fields, or running pilots.

◮ It is irresponsible to assume that determined

effort by an adversary won’t defeat IV security.

slide-71
SLIDE 71

Helios

◮ Best internet voting

system I know: “Helios” by Ben Adida (former PhD student of mine).

slide-72
SLIDE 72

Helios

◮ Best internet voting

system I know: “Helios” by Ben Adida (former PhD student of mine).

◮ Ben says firmly,

“A government election is something you don’t want to do over the Internet.”

slide-73
SLIDE 73

Technology abuse

◮ Some folks are just be a bit too infatuated

with the latest tech...

slide-74
SLIDE 74

Technology abuse

◮ Some folks are just be a bit too infatuated

with the latest tech...

◮ They ask,

“What are best practices for internet voting?”

slide-75
SLIDE 75

What is the best way to play in traffic?

slide-76
SLIDE 76

What is the best way to play in traffic?

slide-77
SLIDE 77

What is the best way to become roadkill?

slide-78
SLIDE 78

What is the best way to become roadkill?

slide-79
SLIDE 79

Internet Voting Summary

slide-80
SLIDE 80

Internet Voting Summary Wargames (1983):

slide-81
SLIDE 81

Internet Voting Summary Wargames (1983): “Sometimes the only winning move is

slide-82
SLIDE 82

Internet Voting Summary Wargames (1983): “Sometimes the only winning move is not to play.”

slide-83
SLIDE 83

We don’t need to play in traffic! (Footbridge = paper ballots)

slide-84
SLIDE 84

Moving forward...

◮ Many people seem to want to “vote on the

Internet” (why?????)

slide-85
SLIDE 85

Moving forward...

◮ Many people seem to want to “vote on the

Internet” (why?????)

◮ Most don’t recognize the severe security

problems it entails

slide-86
SLIDE 86

Moving forward...

◮ Many people seem to want to “vote on the

Internet” (why?????)

◮ Most don’t recognize the severe security

problems it entails

◮ More research is reasonable (e.g. could a

blockchain help??),

slide-87
SLIDE 87

Moving forward...

◮ Many people seem to want to “vote on the

Internet” (why?????)

◮ Most don’t recognize the severe security

problems it entails

◮ More research is reasonable (e.g. could a

blockchain help??),

◮ But one shouldn’t expect near-term (10-year)

“solutions”

slide-88
SLIDE 88

Moving forward...

◮ Many people seem to want to “vote on the

Internet” (why?????)

◮ Most don’t recognize the severe security

problems it entails

◮ More research is reasonable (e.g. could a

blockchain help??),

◮ But one shouldn’t expect near-term (10-year)

“solutions”

◮ Indeed, this isn’t the kind of problem that has

a “solution” preventing security breaches;

  • ne rather needs good procedures for

dealing with the certainty of getting hacked and dealing with DOS attacks.

slide-89
SLIDE 89

The End

slide-90
SLIDE 90

What about “end-to-end” internet voting? An “end-to-end” voting system provides additional auditing capabilities for voters and

  • thers to detect when the election has “gone

awry.” Without paper ballots, an E2E voting system doesn’t provide much in the way of a recovery mechanism to determine and restore the correct election outcome once a problem is detected. Nonetheless, the recent U.S. Vote Foundation report on internet voting recommends that E2E voting properties are necessary (but not sufficient) for internet voting systems.