+ All Categories
Home > Documents > E-voting protocol ----electing a University President

E-voting protocol ----electing a University President

Date post: 24-Feb-2016
Category:
Upload: goro
View: 92 times
Download: 0 times
Share this document with a friend
Description:
E-voting protocol ----electing a University President. [email protected] July 13 id , 2011. Resource. Person D. Chaum ( mixnet in 1981 ) J. Benaloh (casting protocol in 1994) Ben Adida (Helios) Paper Internet voting, security and privacy Helios: web-based open audit voting(2009) - PowerPoint PPT Presentation
73
E-voting protocol ----electing a University President [email protected] July 13 id , 2011
Transcript
Page 1: E-voting protocol ----electing a University President

E-voting protocol----electing a University President

[email protected] 13id, 2011

Page 2: E-voting protocol ----electing a University President

Resource• Person

– D. Chaum (mixnet in 1981)– J. Benaloh (casting protocol in 1994)– Ben Adida (Helios)

• Paper– Internet voting, security and privacy– Helios: web-based open audit voting(2009)– Helios: electing a University President using Open-Audit

voting: Analysis of real-world use of Helios(2010)– Secure electing voting—a framework(E2E)– Exploiting the Client Vulnerabilities in Internet E-voting

Systems: Hacking Helios 2.0 as an Example

http://ben.adida.net/presentations/

Advances in Cryptographic Voting Systems, MIT, 2006

2

Page 3: E-voting protocol ----electing a University President

Roadmap• Problem and background

– Internet Voting, Security and Privacy– Voting Security Overview

• Helios(2008-v1.0,2009-v2.0,2011-v3.1+)– Web-based open-audit voting – Electing an University President(March,2009)– How to install Helios v3.1 in my own server– Attack and Defense

• A possible end

3

Page 4: E-voting protocol ----electing a University President

Internet voting, Security and Privacy• Law

• Security– Client

• Bug and OS (网页挂马攻击 , PKI 证书欺骗)– Server

• Database(phishing 假冒投票网站 )– Network (redirect)

• DNS(DNS poisoning)• BGP (路由欺骗)• Route (放大攻击, IP 欺骗, DHCP 安全协议问题 , SYN 洪泛, UDP 洪泛, TCP RST 攻击, TCP 会话劫持, 路由欺骗)

• Privacy 4

Page 5: E-voting protocol ----electing a University President

Background

• E-voting history– Greece– Paper ballots– Voting machine– Internet and real world voting(March, 2009)

• ?US president(Bush), Diebold, 2000 (Kohno-Stubblefield-Rubin-Wallach)

• Helios2.0: web-based open audit voting system

5

Page 6: E-voting protocol ----electing a University President

Voting Security Overview

黄蓉心仪:郭靖欧阳锋 (A Coercer) :欧阳克

6

Page 7: E-voting protocol ----electing a University President

7

Page 8: E-voting protocol ----electing a University President

Helios: open-audit e-voting system• Problem

– How to get a result by voting?– Chain of custody– Low-coercion ( 胁迫性 )

• Technical concept– MixNet (Server, protect the relationship by crypt)– Benaloh casting protocol(audit back-end counting)

• Moving the black box– Zero-knowledge proof

• Verify operations on encrypted data

8

Page 9: E-voting protocol ----electing a University President

Problem

黄蓉选:黄药师郭靖选:洪七公欧阳克选:欧阳锋9

Page 10: E-voting protocol ----electing a University President

10

Page 11: E-voting protocol ----electing a University President

11

Page 12: E-voting protocol ----electing a University President

Truly Verifiable Voting

12

Page 13: E-voting protocol ----electing a University President

Keep secret data Open the black box

13

Page 14: E-voting protocol ----electing a University President

14

Page 15: E-voting protocol ----electing a University President

Helios 2.0• Hardware and software– Linux, MS, MacOS– Web browser(Safari2/3, Firefox 2.0/3.0, IE6/7/8,

Chrom1.0)+JavaScript (Client)– Free/open source software stack(v2.0),

python(Django web toolkit for python) Postgre SQL database

– PHP(v3.1 server)• http://heliosvoting .org (registered by facebook or

google)• Zero-Knowledge Proof• MixNet• Benaloh Casting 15

Page 16: E-voting protocol ----electing a University President

16

Page 17: E-voting protocol ----electing a University President

17

Page 18: E-voting protocol ----electing a University President

18

Page 19: E-voting protocol ----electing a University President

19

Page 20: E-voting protocol ----electing a University President

20

Page 21: E-voting protocol ----electing a University President

21

Page 22: E-voting protocol ----electing a University President

22

Page 23: E-voting protocol ----electing a University President

23

Page 24: E-voting protocol ----electing a University President

24

Page 25: E-voting protocol ----electing a University President

25

Page 26: E-voting protocol ----electing a University President

26

Page 27: E-voting protocol ----electing a University President

27

Page 28: E-voting protocol ----electing a University President

28

Page 29: E-voting protocol ----electing a University President

29

Page 30: E-voting protocol ----electing a University President

From Helios 1.0 to 2.0

http://code.google.com/appengine/

30

Page 31: E-voting protocol ----electing a University President

The voting website was successfully tested on Linux, Mac OSX and Windows with theFirefox 2 and 3, Internet Explorer 6, 7 and 8, Safari 2 and 3, and Chrome 1 web browsers.

31

Page 32: E-voting protocol ----electing a University President

32

Page 33: E-voting protocol ----electing a University President

33

Page 34: E-voting protocol ----electing a University President

Helios: electing a university president in real world

34

Page 35: E-voting protocol ----electing a University President

35

Page 36: E-voting protocol ----electing a University President

36

Page 37: E-voting protocol ----electing a University President

37

Page 38: E-voting protocol ----electing a University President

38

Page 39: E-voting protocol ----electing a University President

39

Page 40: E-voting protocol ----electing a University President

Helios--Attacks and Defense

• Estehgari-Desmedt, August 2010– http://www.cs.ucl.ac.uk/staff/y.desmedt/slides/Ha

cking-Helios2.pdf– http://www.usenix.org/event/evtwote10/tech/

full0papers/Estehgari.pdf• Wikströn and Smyth-Cortier, December 2010

– http://www.di.ens.fr/cryptoSeminaire.html/#Attacking_ballot_secrecy_in_Heli

40

Page 41: E-voting protocol ----electing a University President

41

Page 42: E-voting protocol ----electing a University President

42

Page 43: E-voting protocol ----electing a University President

43

Page 44: E-voting protocol ----electing a University President

44

Page 45: E-voting protocol ----electing a University President

45

Page 46: E-voting protocol ----electing a University President

46

Page 47: E-voting protocol ----electing a University President

47

Page 48: E-voting protocol ----electing a University President

48

Page 49: E-voting protocol ----electing a University President

49

Page 50: E-voting protocol ----electing a University President

50

Page 51: E-voting protocol ----electing a University President

51

Page 52: E-voting protocol ----electing a University President

52

Page 53: E-voting protocol ----electing a University President

53

Page 54: E-voting protocol ----electing a University President

54

Page 55: E-voting protocol ----electing a University President

55

Page 56: E-voting protocol ----electing a University President

56

Page 57: E-voting protocol ----electing a University President

Helios: Response

57

Page 58: E-voting protocol ----electing a University President

Helios: Response

58

Page 59: E-voting protocol ----electing a University President

Helios: how to install(1)

• How to install Helios v3.1 in my own server

59

Page 60: E-voting protocol ----electing a University President

Helios: how to install(2)

60

Page 61: E-voting protocol ----electing a University President

Helios: how to install(3)

61

Page 62: E-voting protocol ----electing a University President

Helios: how to install(4)

62

Page 63: E-voting protocol ----electing a University President

Helios: how to install(5)

63

Page 64: E-voting protocol ----electing a University President

Helios: how to install(6)

64

Page 65: E-voting protocol ----electing a University President

回顾金庸原著与 83 版华山论剑• 第一局

– 洪七公、黄药师、郭靖– 郭靖胜出

• 第二局– 欧阳锋、洪七公 + 黄药师 + 郭靖– 欧阳锋胜出

• 结局– 黄蓉给欧阳锋设的局– 一个哲学问题 : “我 是 谁”

65

Page 66: E-voting protocol ----electing a University President

候选人的竞选宣言• 洪七公(计算机系主任)

– 大学教育• 黄药师(数学系主任 )

– 学科建设• 欧阳锋(化学系主任)

– 千万别出事

66

Page 67: E-voting protocol ----electing a University President

投票系统使用前的对决• 黄蓉(计算机系网络安全博士)

– 准备了一批基于硬件虚拟化的机器供有意使用官方机器的投票者使用• 去掉原有硬盘、关掉无线与远程控制功能• 修补漏洞与软件更新

– 多个物理独立的服务器分别完成注册、发票与计票工作– 投票系统上线测试一个月

• 食堂门前、教室 BBS 、电梯间内广发宣传册– 学习相关法律文件,检查隐私权保护及密钥使用权限

67

Page 68: E-voting protocol ----electing a University President

投票系统使用前的宣传工作• 校园内宣传选举时间及系统使用演示视频

– 午饭时间(食堂内电视)– 教室墙壁张贴打印版– 论坛 BBS 公开源代码

• 注册时间可选且可试用测试投票系统• 投票时间机动可选

68

Page 69: E-voting protocol ----electing a University President

投票系统使用前的对决• 欧阳克在软件测试与投票人注册时可访问系统间隙的工作

– 邮箱、 URL 挂马– 办公软件(文档编辑)漏洞挂马– cookie– 网页挂马– 利用自动更新功能于后台分版分步下载恶意软件– 篡改投票内容(引入另一链接)– 改变候选人的竞选宣言的链接

69

Page 70: E-voting protocol ----electing a University President

故事接龙之投票网站攻与防• 华筝(来自 M 大的交流学生) /梅超风(计算机系研究生)

–伪装成 victim/HoneyPot诱出攻击者–跟踪 IP地址找到攻击机来源并入侵到攻击者机器中– 利用自动更新系统收集 rootkit 代码数据并转交郭靖(程序比特位对齐技术已获专利)

• 郭靖的防御(网络管理员)–购置并学习使用网络流量实时监控协议分析仪–依据攻击代码,修改程序– 投票系统正式上线前一天晚上完成代码优化工作 70

Page 71: E-voting protocol ----electing a University President

投票系统上线前的准备工作• A set of secured client machines for voters

who wished to use an official voting machine– 供投票者使用的开放实验室机房(基于 ZEN 的虚拟机系统 )–紧急调用具有干净系统的备用机器(客户端)

• Implemented its own, high-speed, offline tallier and verifier

• 密钥产生过程(专家现场监督与断网专用机)71

Page 72: E-voting protocol ----electing a University President

故事接龙之投票网站攻与防• 候选人

– 洪七公、黄药师、欧阳锋• 投票人

– 全校教师、学生、工作人员、技术人员• 黄蓉的纠结

–弃权?– 一人一票?东邪?洪七公–一人三票:郭靖、东邪、洪七公(下一步工作)

72

Page 73: E-voting protocol ----electing a University President

T 大校长选举• 遴选什么样的校长

– 一流的教育家• 个人成就• 门下桃李(黄蓉、郭靖)• 同辈

– 南帝、东邪、老顽童– 西毒

73


Recommended