SlideShare a Scribd company logo
The ruling of the German Federal
Constitutional Court and its
technical consequences on eVoting
Alexander Prosser
http://e-voting.at

A real issue:

Finland 2008: ~ 200 evotes “disappeared”,
     election had to be repeated on paper


           Step              Step           Step           Step




                     Audit          Audit          Audit




=> Could indicate failure in audit trail
                                                                  2
http://e-voting.at


U.K. 2007: Software support staff manually
     edited ballots as they would not fit into the counting
     software. Key processes were performed on vendor-
     supplied notebook computers by support staff

ibid: Unaccounted data transfers by USB sticks during
     the ongoing election


     => Loss of control by election authorities ?

                                                       3
http://e-voting.at


Austria 2009: Head of election committee at student
      union elections boarded a fire fighting vehicle
      accompanied by an armed guard to take computer
      disks to erasure.
      Data could have allowed match voter – vote.*

ibid: Independent recount was not possible
      “We are at the mercy of the technicians”
      “I am convinced, I believe them”*

* derstandard.at 24.6.2009, my translation
                                                        4
http://e-voting.at




How can something inherently unobservable be

made observable and hence auditable ?




                                               5
http://e-voting.at




© futurezone.orf.at 28.5.2009 (c) Günther Hack

                                                 6
http://e-voting.at




© futurezone.orf.at 28.5.2009 (c) Günther Hack

                                                 7
http://e-voting.at




© futurezone.orf.at 28.5.2009 (c) Günther Hack

                                                 8
http://e-voting.at

Germany: Federal elections 2005,
     ~2m voters cast votes with election terminals in
     polling stations. Complaints alleged massive lack of
     auditability,


     that voters were unable to verify that their votes
     were counted correctly,


     that the Public was not able to follow election
     procedures.
                                                          9
http://e-voting.at

BMI: Public could observe how election
     staff copied the result computed by the machine into
     their tally.
     Also, machines were certified by PTB, Berlin

Complaints: Neither source code nor certification report
     were published


The certification report for the Austrian student union pilot was not
    published.
U.K. typically publishes such reports, recently also the U.S.
                                                                10
http://e-voting.at

Court Ruling:


     - Barred the voting terminals used


     - Decree enabling their use nullified


     - Voter must reliably ascertain that his vote was
       counted and included in the tally correctly



                                                     11
http://e-voting.at

Court did not pursue the complaints regarding
       publication of source code and certification report
       => They do “not decisively contribute to achieve
       the constitutional level of verifiability and
       reproducibility of the election results”*

Contradicts the mainstream in evoting community.

=> The election, not the software has to be auditable

* my translation



                                                       12
http://e-voting.at




        What does this mean for Internet voting ?




                                                    13
http://e-voting.at

 “Voter must reliably ascertain that his vote
 was counted and included in the tally correctly”



  Individual verification             Global verification



  Useless            Dangerous

Either you can verify how your vote
was counted or not.
                                                            14
http://e-voting.at

Voter must reliably ascertain that his vote
was counted and included in the tally correctly

       Global verification
       - Ballot box initially empty?
       - Can only authenticated voters vote?
       - Can they submit but one vote?
       - Only rightfully submitted votes in ballot box?
       - Ballot box under control of election committee?
       - No votes added to the count?
       - All votes counted?
       - Does election committee decide on how to count the votes?
       - ….
                                                                     15
http://e-voting.at

Manipulation protection:


       Who can manipulate what ?




                                   16
http://e-voting.at

  What?                A single vote   The votes of a   The entire
  Who?                                 unit (ward,      election
                                       constituency)
  A single entity                                       Worst case


  Coalition
  involving the
  voter
  Coalition      not
  involving election
  committee

  Coalition     with
  committee
  member/s

  The       election
  committee and
  resp. voter/s
                       Best case




                                                                     17
http://e-voting.at

Avoid common pitfalls:
1. Single point of manipulation
                     Public key of the ballot box


                                          Mixer

      Voter                  (1)

                Public key of the mixer

                               (2)



                                                    18
http://e-voting.at




                     Public key of the ballot box


                                          Mixer
                                            (4)
      Voter                  (1)
                                          (3)
                Public key of the mixer

                               (2)



                                                    19
http://e-voting.at




                     Public key of the ballot box


                                          Mixer
                                            (4)
      Voter                  (1)                    (5)
                                          (3)             (6)
                Public key of the mixer

                               (2)



                                                                20
http://e-voting.at

    The mixer‘s „election result“


                     Public key of the ballot box


                                          Mixer
                                            (4)
      Voter                  (1)
                                          (3)
                Public key of the mixer

                               (2)



                                                    21
http://e-voting.at


                                                Suppressed

                     Public key of the ballot box


                                          Mixer
                                            (4)
      Voter                  (1)
                                          (3)
                Public key of the mixer

                               (2)



                                                             22
http://e-voting.at




                     Public key of the ballot box


                                          Mixer
                                            (4)
      Voter                  (1)                    (5)
                                          (3)             (6)
                Public key of the mixer

                               (2)



                                                                23
http://e-voting.at

Avoid common pitfalls:
2. Beware of the paper analogy




                                 24
http://e-voting.at




                 (1) Encryption




         (2) Digital
         signature




                       Encrypted
                         vote
  (3) Vote cast Digital signature



                                    25
http://e-voting.at




                 (1) Encryption




         (2) Digital
         signature                   (5) Transfer of authority




                                                  E-votes         Results
                       Encrypted
                         vote
                                                 (6) Decryption and counting
  (3) Vote cast Digital signature

            (4) Signature verification
                                                                            26
http://e-voting.at




                 (1) Encryption




         (2) Digital
         signature                   (5) Transfer of authority




                                                  E-votes         Results
                       Encrypted
                         vote
                                                 (6) Decryption and counting
  (3) Vote cast Digital signature

            (4) Signature verification
                                                                            27
http://e-voting.at


What is required ?

Independent verification of voting right

Authentication of ballots while maintaining
     voting secrecy
     => Requires anonymization of the vote
         before, not after submission

Control by the election committee

Independent recounts
                                              28
http://e-voting.at




Alexander Prosser
Univ. Economics and Business, Vienna
prosser@wu.ac.at
http://e-voting.at




                                       29

More Related Content

More from Danube University Krems, Centre for E-Governance

#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
Danube University Krems, Centre for E-Governance
 
#CeDEM17 - Financial Payments and Smart Cities
#CeDEM17 - Financial Payments and Smart Cities #CeDEM17 - Financial Payments and Smart Cities
#CeDEM17 - Financial Payments and Smart Cities
Danube University Krems, Centre for E-Governance
 
#CeDEM2017 Smart Cities of Self-Determined Data Subjects
#CeDEM2017 Smart Cities of Self-Determined Data Subjects#CeDEM2017 Smart Cities of Self-Determined Data Subjects
#CeDEM2017 Smart Cities of Self-Determined Data Subjects
Danube University Krems, Centre for E-Governance
 
Open Data as Enabler of Public Service Co-creation: Exploring the Drivers and...
Open Data as Enabler of Public Service Co-creation:Exploring the Drivers and...Open Data as Enabler of Public Service Co-creation:Exploring the Drivers and...
Open Data as Enabler of Public Service Co-creation: Exploring the Drivers and...
Danube University Krems, Centre for E-Governance
 
DatalEt-Ecosystem Provider - The DEEP project
DatalEt-Ecosystem Provider - The DEEP projectDatalEt-Ecosystem Provider - The DEEP project
DatalEt-Ecosystem Provider - The DEEP project
Danube University Krems, Centre for E-Governance
 
Towards Open Justice: ICT acceptance in the Greek justice system
Towards Open Justice: ICT acceptance in the Greek justice systemTowards Open Justice: ICT acceptance in the Greek justice system
Towards Open Justice: ICT acceptance in the Greek justice system
Danube University Krems, Centre for E-Governance
 
[X]CHANGING PERSPECTIVES
[X]CHANGING PERSPECTIVES[X]CHANGING PERSPECTIVES
Using fuzzy cognitive maps as decision support tool for smart cities goraczek
Using fuzzy cognitive maps as decision support tool for smart cities  goraczekUsing fuzzy cognitive maps as decision support tool for smart cities  goraczek
Using fuzzy cognitive maps as decision support tool for smart cities goraczek
Danube University Krems, Centre for E-Governance
 
Understanding of smartphone divide dal yong
Understanding of smartphone divide  dal yongUnderstanding of smartphone divide  dal yong
Understanding of smartphone divide dal yong
Danube University Krems, Centre for E-Governance
 
The motivations behind open access publishing judith schossboeck
The motivations behind open access publishing  judith schossboeckThe motivations behind open access publishing  judith schossboeck
The motivations behind open access publishing judith schossboeck
Danube University Krems, Centre for E-Governance
 
Social media as hobed of racism and hate speech kobayashi, kaigo, kwak
Social media as hobed of racism and hate speech kobayashi, kaigo, kwakSocial media as hobed of racism and hate speech kobayashi, kaigo, kwak
Social media as hobed of racism and hate speech kobayashi, kaigo, kwak
Danube University Krems, Centre for E-Governance
 
Social media and citizen engagement in asia skoric
Social media and citizen engagement in asia  skoricSocial media and citizen engagement in asia  skoric
Social media and citizen engagement in asia skoric
Danube University Krems, Centre for E-Governance
 
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulosRealizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
Danube University Krems, Centre for E-Governance
 
Post 2015 paris c limate conference politics on the internet manuela hartwig
Post 2015 paris c limate conference politics on the internet  manuela hartwigPost 2015 paris c limate conference politics on the internet  manuela hartwig
Post 2015 paris c limate conference politics on the internet manuela hartwig
Danube University Krems, Centre for E-Governance
 
Open government and national sovereignty ivo babaja
Open government and national sovereignty  ivo babajaOpen government and national sovereignty  ivo babaja
Open government and national sovereignty ivo babaja
Danube University Krems, Centre for E-Governance
 
Health r isk communication in the digital era myojung chung
Health r isk communication in the digital era myojung chungHealth r isk communication in the digital era myojung chung
Health r isk communication in the digital era myojung chung
Danube University Krems, Centre for E-Governance
 
An analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigoAn analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigo
Danube University Krems, Centre for E-Governance
 
GovCamp 2016 - Co-Creation
GovCamp 2016 - Co-CreationGovCamp 2016 - Co-Creation
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
Danube University Krems, Centre for E-Governance
 
Erfolgreiche Unternehmensführung verlangt sorgsamen und transparenten Umgang ...
Erfolgreiche Unternehmensführung verlangt sorgsamen und transparenten Umgang ...Erfolgreiche Unternehmensführung verlangt sorgsamen und transparenten Umgang ...
Erfolgreiche Unternehmensführung verlangt sorgsamen und transparenten Umgang ...
Danube University Krems, Centre for E-Governance
 

More from Danube University Krems, Centre for E-Governance (20)

#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
#CeDEM17 - Towards an Open Data based ICT Reference Architecture for Smart Ci...
 
#CeDEM17 - Financial Payments and Smart Cities
#CeDEM17 - Financial Payments and Smart Cities #CeDEM17 - Financial Payments and Smart Cities
#CeDEM17 - Financial Payments and Smart Cities
 
#CeDEM2017 Smart Cities of Self-Determined Data Subjects
#CeDEM2017 Smart Cities of Self-Determined Data Subjects#CeDEM2017 Smart Cities of Self-Determined Data Subjects
#CeDEM2017 Smart Cities of Self-Determined Data Subjects
 
Open Data as Enabler of Public Service Co-creation: Exploring the Drivers and...
Open Data as Enabler of Public Service Co-creation:Exploring the Drivers and...Open Data as Enabler of Public Service Co-creation:Exploring the Drivers and...
Open Data as Enabler of Public Service Co-creation: Exploring the Drivers and...
 
DatalEt-Ecosystem Provider - The DEEP project
DatalEt-Ecosystem Provider - The DEEP projectDatalEt-Ecosystem Provider - The DEEP project
DatalEt-Ecosystem Provider - The DEEP project
 
Towards Open Justice: ICT acceptance in the Greek justice system
Towards Open Justice: ICT acceptance in the Greek justice systemTowards Open Justice: ICT acceptance in the Greek justice system
Towards Open Justice: ICT acceptance in the Greek justice system
 
[X]CHANGING PERSPECTIVES
[X]CHANGING PERSPECTIVES[X]CHANGING PERSPECTIVES
[X]CHANGING PERSPECTIVES
 
Using fuzzy cognitive maps as decision support tool for smart cities goraczek
Using fuzzy cognitive maps as decision support tool for smart cities  goraczekUsing fuzzy cognitive maps as decision support tool for smart cities  goraczek
Using fuzzy cognitive maps as decision support tool for smart cities goraczek
 
Understanding of smartphone divide dal yong
Understanding of smartphone divide  dal yongUnderstanding of smartphone divide  dal yong
Understanding of smartphone divide dal yong
 
The motivations behind open access publishing judith schossboeck
The motivations behind open access publishing  judith schossboeckThe motivations behind open access publishing  judith schossboeck
The motivations behind open access publishing judith schossboeck
 
Social media as hobed of racism and hate speech kobayashi, kaigo, kwak
Social media as hobed of racism and hate speech kobayashi, kaigo, kwakSocial media as hobed of racism and hate speech kobayashi, kaigo, kwak
Social media as hobed of racism and hate speech kobayashi, kaigo, kwak
 
Social media and citizen engagement in asia skoric
Social media and citizen engagement in asia  skoricSocial media and citizen engagement in asia  skoric
Social media and citizen engagement in asia skoric
 
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulosRealizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
Realizin modeling and evaluation city's enerfy efficiency leonidas anthopoulos
 
Post 2015 paris c limate conference politics on the internet manuela hartwig
Post 2015 paris c limate conference politics on the internet  manuela hartwigPost 2015 paris c limate conference politics on the internet  manuela hartwig
Post 2015 paris c limate conference politics on the internet manuela hartwig
 
Open government and national sovereignty ivo babaja
Open government and national sovereignty  ivo babajaOpen government and national sovereignty  ivo babaja
Open government and national sovereignty ivo babaja
 
Health r isk communication in the digital era myojung chung
Health r isk communication in the digital era myojung chungHealth r isk communication in the digital era myojung chung
Health r isk communication in the digital era myojung chung
 
An analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigoAn analysis of japanese local government facebook profiles muneo kaigo
An analysis of japanese local government facebook profiles muneo kaigo
 
GovCamp 2016 - Co-Creation
GovCamp 2016 - Co-CreationGovCamp 2016 - Co-Creation
GovCamp 2016 - Co-Creation
 
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
Datenschutzbeauftragte werden in Zukunft eine wichtige Rolle im Unternehmen s...
 
Erfolgreiche Unternehmensführung verlangt sorgsamen und transparenten Umgang ...
Erfolgreiche Unternehmensführung verlangt sorgsamen und transparenten Umgang ...Erfolgreiche Unternehmensführung verlangt sorgsamen und transparenten Umgang ...
Erfolgreiche Unternehmensführung verlangt sorgsamen und transparenten Umgang ...
 

Recently uploaded

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
sonjaschweigert1
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
KAMESHS29
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
DianaGray10
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
James Anderson
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
DianaGray10
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
James Anderson
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
Ana-Maria Mihalceanu
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
Rohit Gautam
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
Pierluigi Pugliese
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
Neo4j
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Albert Hoitingh
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
Neo4j
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems S.M.S.A.
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
SOFTTECHHUB
 

Recently uploaded (20)

A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...A tale of scale & speed: How the US Navy is enabling software delivery from l...
A tale of scale & speed: How the US Navy is enabling software delivery from l...
 
RESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for studentsRESUME BUILDER APPLICATION Project for students
RESUME BUILDER APPLICATION Project for students
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1Communications Mining Series - Zero to Hero - Session 1
Communications Mining Series - Zero to Hero - Session 1
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...
 
UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6UiPath Test Automation using UiPath Test Suite series, part 6
UiPath Test Automation using UiPath Test Suite series, part 6
 
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
Alt. GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using ...
 
Monitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR EventsMonitoring Java Application Security with JDK Tools and JFR Events
Monitoring Java Application Security with JDK Tools and JFR Events
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
Large Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial ApplicationsLarge Language Model (LLM) and it’s Geospatial Applications
Large Language Model (LLM) and it’s Geospatial Applications
 
By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024By Design, not by Accident - Agile Venture Bolzano 2024
By Design, not by Accident - Agile Venture Bolzano 2024
 
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
GraphSummit Singapore | Neo4j Product Vision & Roadmap - Q2 2024
 
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
Encryption in Microsoft 365 - ExpertsLive Netherlands 2024
 
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
GraphSummit Singapore | The Future of Agility: Supercharging Digital Transfor...
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
Uni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdfUni Systems Copilot event_05062024_C.Vlachos.pdf
Uni Systems Copilot event_05062024_C.Vlachos.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
Why You Should Replace Windows 11 with Nitrux Linux 3.5.0 for enhanced perfor...
 

The ruling of the German Federal Constitutional Court and its technical consequences on eVoting

  • 1. The ruling of the German Federal Constitutional Court and its technical consequences on eVoting Alexander Prosser
  • 2. http://e-voting.at A real issue: Finland 2008: ~ 200 evotes “disappeared”, election had to be repeated on paper Step Step Step Step Audit Audit Audit => Could indicate failure in audit trail 2
  • 3. http://e-voting.at U.K. 2007: Software support staff manually edited ballots as they would not fit into the counting software. Key processes were performed on vendor- supplied notebook computers by support staff ibid: Unaccounted data transfers by USB sticks during the ongoing election => Loss of control by election authorities ? 3
  • 4. http://e-voting.at Austria 2009: Head of election committee at student union elections boarded a fire fighting vehicle accompanied by an armed guard to take computer disks to erasure. Data could have allowed match voter – vote.* ibid: Independent recount was not possible “We are at the mercy of the technicians” “I am convinced, I believe them”* * derstandard.at 24.6.2009, my translation 4
  • 5. http://e-voting.at How can something inherently unobservable be made observable and hence auditable ? 5
  • 9. http://e-voting.at Germany: Federal elections 2005, ~2m voters cast votes with election terminals in polling stations. Complaints alleged massive lack of auditability, that voters were unable to verify that their votes were counted correctly, that the Public was not able to follow election procedures. 9
  • 10. http://e-voting.at BMI: Public could observe how election staff copied the result computed by the machine into their tally. Also, machines were certified by PTB, Berlin Complaints: Neither source code nor certification report were published The certification report for the Austrian student union pilot was not published. U.K. typically publishes such reports, recently also the U.S. 10
  • 11. http://e-voting.at Court Ruling: - Barred the voting terminals used - Decree enabling their use nullified - Voter must reliably ascertain that his vote was counted and included in the tally correctly 11
  • 12. http://e-voting.at Court did not pursue the complaints regarding publication of source code and certification report => They do “not decisively contribute to achieve the constitutional level of verifiability and reproducibility of the election results”* Contradicts the mainstream in evoting community. => The election, not the software has to be auditable * my translation 12
  • 13. http://e-voting.at What does this mean for Internet voting ? 13
  • 14. http://e-voting.at “Voter must reliably ascertain that his vote was counted and included in the tally correctly” Individual verification Global verification Useless Dangerous Either you can verify how your vote was counted or not. 14
  • 15. http://e-voting.at Voter must reliably ascertain that his vote was counted and included in the tally correctly Global verification - Ballot box initially empty? - Can only authenticated voters vote? - Can they submit but one vote? - Only rightfully submitted votes in ballot box? - Ballot box under control of election committee? - No votes added to the count? - All votes counted? - Does election committee decide on how to count the votes? - …. 15
  • 16. http://e-voting.at Manipulation protection: Who can manipulate what ? 16
  • 17. http://e-voting.at What? A single vote The votes of a The entire Who? unit (ward, election constituency) A single entity Worst case Coalition involving the voter Coalition not involving election committee Coalition with committee member/s The election committee and resp. voter/s Best case 17
  • 18. http://e-voting.at Avoid common pitfalls: 1. Single point of manipulation Public key of the ballot box Mixer Voter (1) Public key of the mixer (2) 18
  • 19. http://e-voting.at Public key of the ballot box Mixer (4) Voter (1) (3) Public key of the mixer (2) 19
  • 20. http://e-voting.at Public key of the ballot box Mixer (4) Voter (1) (5) (3) (6) Public key of the mixer (2) 20
  • 21. http://e-voting.at The mixer‘s „election result“ Public key of the ballot box Mixer (4) Voter (1) (3) Public key of the mixer (2) 21
  • 22. http://e-voting.at Suppressed Public key of the ballot box Mixer (4) Voter (1) (3) Public key of the mixer (2) 22
  • 23. http://e-voting.at Public key of the ballot box Mixer (4) Voter (1) (5) (3) (6) Public key of the mixer (2) 23
  • 24. http://e-voting.at Avoid common pitfalls: 2. Beware of the paper analogy 24
  • 25. http://e-voting.at (1) Encryption (2) Digital signature Encrypted vote (3) Vote cast Digital signature 25
  • 26. http://e-voting.at (1) Encryption (2) Digital signature (5) Transfer of authority E-votes Results Encrypted vote (6) Decryption and counting (3) Vote cast Digital signature (4) Signature verification 26
  • 27. http://e-voting.at (1) Encryption (2) Digital signature (5) Transfer of authority E-votes Results Encrypted vote (6) Decryption and counting (3) Vote cast Digital signature (4) Signature verification 27
  • 28. http://e-voting.at What is required ? Independent verification of voting right Authentication of ballots while maintaining voting secrecy => Requires anonymization of the vote before, not after submission Control by the election committee Independent recounts 28
  • 29. http://e-voting.at Alexander Prosser Univ. Economics and Business, Vienna prosser@wu.ac.at http://e-voting.at 29