User: Password:
Subscribe / Log in / New account

Security quotes of the week

Security quotes of the week

Posted Feb 14, 2013 4:27 UTC (Thu) by davidescott (guest, #58580)
In reply to: Security quotes of the week by apoelstra
Parent article: Security quotes of the week

> Alternately, you could allow multiple votes and only count the most recent one, which is easy to do if everybody has a unique encryption key.

"most recent" what does that mean? You've just moved a problem in security into one of atomicity and global timekeeping. I think Einstein would have some thoughts on how plausible this approach would be.

(Log in to post comments)

Security quotes of the week

Posted Feb 14, 2013 5:48 UTC (Thu) by apoelstra (subscriber, #75205) [Link]

>"most recent" what does that mean?

Time ordering would be determined by hash chains, probably. So you could see "vote X overrides vote Y" and there would be no way to interpret this as "vote Y overrides vote X".

No need to map to/from physical time, except by accident. So Einstein would be happy. :)

Security quotes of the week

Posted Feb 14, 2013 16:30 UTC (Thu) by davidescott (guest, #58580) [Link]

> Time ordering would be determined by hash chains, probably.

The obvious question is "hash chains of what?" I think you are pretty aware of one major challenge which is simplicity in that you earlier said:

> The simplicity thing is probably what will get you. Otherwise you could say "register a GPG key when you register to vote, then sign "I, ZZZ, vote for XXX at time YYY" and encrypt the signed message with the government voting key".

So lets replace "time YYY" with "most recent publicized hash base." It needs to be something public otherwise Fox News would have a field day. Pay a bunch of people to vote for Obama and submit that, and then wait until after the results are announced to produce a few thousand new votes properly signed with the government public key, and chained against the individuals previous vote in the register that are for Romney. THE ELECTION WAS RIGGED!!!! VOTERS CHANGING TO ROMNEY DENIED THE OPPORTUNITY!!!!!

So the government manages a clock/checkpoint which takes in all votes V_i arriving at time T, computes and publicizes a hash H_{T+1}=H(H_{T},V_1,...,V_n), and each vote includes as part of its signature H_{t} for some publicized t. If the vote has a stale Hash as the base to its signature I should reject it and notify the voter to resubmit.

There is still a synchronization point, but at least people will know about a failed vote and can resubmit. The problem here is that its split one vote counting problem into a few thousand vote counting problems. Every Joe who submits his vote at 11:59pm and sees it rejected is going to think he was targeted in his vote denial and not that his web connection was a bit slow.

There is also no simple way to verify that H_T was properly computed from the incoming votes and previous hash values. Independent observers will see votes arrive in a different order than the official hashing agent, and will compute different hashes as a result. Trying to reconcile that is going to be a mess and cause people to lose confidence in the system. My Server saw Joe's vote arrive at 11:01pm, but your server claimed it didn't arrive until 12:15am. Clearly you have a bug in your server's queue so I question every vote you tally or refuse to tally beginning at 11pm.

Copyright © 2018, Eklektix, Inc.
Comments and public postings are copyrighted by their creators.
Linux is a registered trademark of Linus Torvalds