On the Security of Election Audits with Low Entropy Randomness
Eric Rescorla ekr@rtfm.com
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 1
On the Security of Election Audits with Low Entropy Randomness Eric - - PowerPoint PPT Presentation
On the Security of Election Audits with Low Entropy Randomness Eric Rescorla ekr@rtfm.com EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 1 Overview Secure auditing requires random sampling The units to be
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 1
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 2
Audit units (U) Attacked (K) Audited (V)
V∩K = / 0: Attacker wins
Audit units (U) Attacked (K) Audited (V)
V∩K = / 0: Attacker loses
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 3
v−1
i=0
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 4
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 5
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 6
160 180 200 220 240 0.000 0.005 0.010 0.015 0.020 0.025 Number of occurrences (n) Probability
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 7
160 180 200 220 240 0.000 0.005 0.010 0.015 0.020 0.025 Number of occurrences (n) Probability Area=k/N
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 8
160 180 200 220 240 0.000 0.005 0.010 0.015 0.020 0.025 Number of occurrences (n) Probability Area=k/N n_k
On the Security of Election Audits with Low Entropy Randomness 9
nk
n=0
v−1
i=0
†Semi-accurate approximation; see paper.
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 10
1 1 1 1 1 1 1 1 1 1 6 7 8 9 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 2 3 4 5 6 7 8 9 2 3 4 5
A table constructed to minimize detection
2 3 4 5 1 6 7 8 9 2 3 4 5 1 6 7 8 9 2 3 4 5 1 6 7 8 9 2 3 4 5 1 6 7 8 9 2 3 4 5 1 6 7 8 9 2 3 4 5 1 6 7 8 9 2 3 4 5 1 6 7 8 9 2 3 4 5 1 6 7 8 9 2 3 4 5 1 6 7 8 9 2 3 4 5 1 6 7 8 9
A table constructed to maximize detection EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 11
†This is heuristic. We don’t have a good algorithm here either.
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 12
100 200 300 400 500 600 0.0 0.2 0.4 0.6 0.8 1.0 Number of Sampled Precincts Probability of Detecting Attack Expected Under Attack
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 13
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 14
Detection Units to Audit Units to Audit Difference Probability (projected) (under attack)† (percent) 80% 148 190 28 90% 205 270 32 95% 258 340 32 99% 368 540 47 Required audit levels: 200,000 entries, 1000 precincts, 10 attacked precincts
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 15
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 16
100 200 300 400 0.0 0.2 0.4 0.6 0.8 1.0 Number of Sampled Precincts Probability of Detecting Attack Expected Under Attack
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 17
100 200 300 400 500 600 0.0 0.2 0.4 0.6 0.8 1.0 Number of Sampled Precincts Probability of Detecting Attack Expected Under attack (permuted) Under attack (random)
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 18
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 19
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 20
10 15 0.0 0.2 0.4 0.6 0.8 1.0 Bits of entropy Probability of Detecting Attack
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 21
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 22
[CHF08] Joseph A. Calandrino, J. Alex Halderman, and Edward W. Felten. In Defense of Pseudorandom Sample Selection. In Proceedings of the 2008 Electronic Voting Technology Workshop, 2008. http://www.usenix.org/events/evt08/tech/full_ papers/calandrino/calandrino.pdf. [CWD06] Arel Cordero, David Wagner, and David Dill. The role of dice in election audits—extended abstract. IAVoSS Workshop on Trustworthy Elections 2006 (WOTE 2006), June 2006. http://www.cs.berkeley.edu/~daw/papers/dice-wote06.pdf. [RAN02] RAND Corporation. A Million Random Digits with 100,000 Normal Deviates. American Book Publishers, 2002.
EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 23