on the security of election audits with low entropy
play

On the Security of Election Audits with Low Entropy Randomness Eric - PowerPoint PPT Presentation

On the Security of Election Audits with Low Entropy Randomness Eric Rescorla ekr@rtfm.com EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 1 Overview Secure auditing requires random sampling The units to be


  1. On the Security of Election Audits with Low Entropy Randomness Eric Rescorla ekr@rtfm.com EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 1

  2. Overview • Secure auditing requires random sampling – The units to be audited must be verifiably unpredictable – Simple physical methods (dice, coins, etc.) are expensive • “Stretching”approaches – Randomness tables [CWD06] – Cryptographic pseudorandom number generators (CSPRNGs) [CHF08] • These techniques must be seeded with verifiably random values • Small (but natural) seeds give the attacker an advantage EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 2

  3. Formalizing the Problem: The Auditing Game Audit units Audit units (U) (U) Attacked Audited Attacked Audited (K) (V) (K) (V) V ∩ K = / 0 : Attacker wins V ∩ K � = / 0 : Attacker loses • Two players: Attacker and Auditor • U audit units ( U 0 , U 1 ,... U N − 1 ) • Attacker selects K ⊂ U to attack ( | K | = k ) – Selection is made before preliminary results are posted • Auditor selects V ⊂ U to audit ( | V | = v ) EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 3

  4. Auditing Game Strategy • If the auditor’s selections are random and i.i.d then: v − 1 ( N − i − k ) ∏ Pr(detection) = 1 − N − i i = 0 • No matter how the attacker chooses K • This is the auditor’s optimal strategy • What about intermediate cases? – Attacker has incomplete information about V EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 4

  5. Example: A Million Random Digits [RAN02] • Pick a random starting group and read forward – This process has log 2 ( # entries ) bits of entropy EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 5

  6. Random Number Tables Bias and Attacker Advantage • Random number tables aren’t the same as random numbers – The attacker knows the table – But not the starting point • Two effects give the attacker an advantage – Natural variation in the occurrences of each value – Clustering of values EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 6

  7. Natural Variation • Binomially distributed counts 0.025 • Expected value = T / N 0.020 Probability 0.015 0.010 0.005 0.000 160 180 200 220 240 Number of occurrences (n) EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 7

  8. Natural Variation • Binomially distributed counts 0.025 • Expected value = T / N 0.020 • Attacker selects k least frequent Probability 0.015 units 0.010 0.005 Area=k/N 0.000 160 180 200 220 240 Number of occurrences (n) EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 8

  9. Natural Variation • Binomially distributed counts 0.025 n_k • Expected value = T / N 0.020 • Attacker selects k least frequent Probability 0.015 units 0.010 • The k th least frequent unit ap- pears n k times 0.005 Area=k/N � � n : cdf ( n ) ≥ k n k = min 0.000 N 160 180 200 220 240 Number of occurrences (n) EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 9

  10. Auditing with Natural Variation • Total entries in table corresponding to k least frequent units † : n k ∑ T bad = N n ϕ ( n ) n = 0 • This is just a standard sampling problem – Each“good”sample removes approximately F entries: F = T − T bad N − k • Probability of detection of least frequent k units: v − 1 T − iF − T bad ∏ Pr(detection) = 1 − T − iF i = 0 † Semi-accurate approximation; see paper. EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 10

  11. Clustering Effects • We’re not really sampling the table randomly – We read entries in sequence – The order of the entries matters 0 0 0 0 0 0 0 0 0 0 0 2 3 4 5 1 6 7 8 9 1 1 1 1 1 1 1 1 1 1 0 2 3 4 5 1 6 7 8 9 6 7 8 9 2 3 4 5 6 7 0 2 3 4 5 1 6 7 8 9 8 9 2 3 4 5 6 7 8 9 0 2 3 4 5 1 6 7 8 9 2 3 4 5 6 7 8 9 2 3 0 2 3 4 5 1 6 7 8 9 4 5 6 7 8 9 2 3 4 5 0 2 3 4 5 1 6 7 8 9 6 7 8 9 2 3 4 5 6 7 0 2 3 4 5 1 6 7 8 9 8 9 2 3 4 5 6 7 8 9 0 2 3 4 5 1 6 7 8 9 2 3 4 5 6 7 8 9 2 3 0 2 3 4 5 1 6 7 8 9 4 5 6 7 8 9 2 3 4 5 0 2 3 4 5 1 6 7 8 9 A table constructed to minimize detection A table constructed to maximize detection EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 11

  12. Simulation Studies • No good analytic model for clustering effect – Though some potential avenues • Easiest to study via simulation – Generate a random table (using CSPRNG) – Generate an attack set of size k – Determine which offsets will sample at least one element of K • Two kinds of attack sets – Random (should have expected statistics) – Randomly selected from least frequent 2 k units † • Results averaged over multiple tables (5–25) † This is heuristic. We don’t have a good algorithm here either. EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 12

  13. Example 1.0 0.8 Probability of Detecting Attack 0.6 0.4 0.2 Expected Under Attack 0.0 0 100 200 300 400 500 600 Number of Sampled Precincts 200,000 entries, 1000 precincts, 10 attacked EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 13

  14. The Attacker’s View: Modest Advantage • Still very likely to be detected – In the above example: about 4x more chance of success at 99% – Biggest gap around 80% nominal detection rate (71.4% actual) • Probably not enough to make or break an attack – But worth doing if you’re going to attack anyway EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 14

  15. The Auditor’s View: Higher Work Factor Detection Units to Audit Units to Audit Difference (under attack) † Probability (projected) (percent) 80% 148 190 28 90% 205 270 32 95% 258 340 32 99% 368 540 47 Required audit levels: 200,000 entries, 1000 precincts, 10 attacked precincts EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 15

  16. General Trends • More entries per unit decrease attacker advantage – Larger tables – Fewer units • Higher attack rates decrease attacker advantage – Need to select increasingly probable values EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 16

  17. A Big Table 1.0 0.8 Probability of Detecting Attack 0.6 0.4 0.2 Expected Under Attack 0.0 0 100 200 300 400 Number of Sampled Precincts 1,000,000 entries, 1000 precincts, 10 attacked precincts EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 17

  18. Permuted Tables 1.0 0.8 Probability of Detecting Attack 0.6 0.4 0.2 Expected Under attack (permuted) Under attack (random) 0.0 0 100 200 300 400 500 600 Number of Sampled Precincts 200,000 entries, 1000 precincts, 10 attacked precincts EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 18

  19. Potential Improvements • New tables – Bigger ( 10 7 entries?) – Permuted rather than random – Generated using a PRNG? • Existing tables – Individual addressing – Random offsets – Multiple starting points – All of these need analysis EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 19

  20. What about CSPRNGs? • CSPRNGs have big state spaces no matter what the seed size – Stronger than tables for the same seed entropy – Intuition: sequences don’t overlap • Cryptographic applications require very large seeds – Not necessary here – Need unpredictability, not unsearchability EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 20

  21. Security of PRNGs by Seed Size (nominal 99% level) 1.0 ● ● ● ● ● ● ● ● ● ● 0.8 ● Probability of Detecting Attack ● 0.6 0.4 ● 0.2 0.0 ● ● ● 5 10 15 Bits of entropy Probability of detection for PRNGs: 1000 precincts, 10 attacked EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 21

  22. Summary • Secure auditing requires verifiably unpredictable random values • Generating them directly seems expensive • Natural stretching approaches may not deliver their expected security • Not clear if randomness tables can be used safely • PRNGs appear safe with modest-sized seeds EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 22

  23. References [CHF08] Joseph A. Calandrino, J. Alex Halderman, and Edward W. Felten. In Defense of Pseudorandom Sample Selection. In Proceedings of the 2008 Electronic Voting Technology Workshop, 2008. http://www.usenix.org/events/evt08/tech/full_ papers/calandrino/calandrino.pdf . [CWD06] Arel Cordero, David Wagner, and David Dill. The role of dice in election audits—extended abstract. IAVoSS Workshop on Trustworthy Elections 2006 (WOTE 2006), June 2006. http://www.cs.berkeley.edu/~daw/papers/dice-wote06.pdf . [RAN02] RAND Corporation. A Million Random Digits with 100,000 Normal Deviates. American Book Publishers, 2002. EVT/WOTE 2009 On the Security of Election Audits with Low Entropy Randomness 23

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend