publication . Preprint . 2019

Cyber-Risks in Paper Voting

Sommer, David M.; Schneider, Moritz; Gut, Jannik; Capkun, Srdjan;
Open Access English
  • Published: 18 Jun 2019
Abstract
Paper ballot voting with its fully-verifiable paper-trail is usually considered as more secure than their e-voting counterparts, given the large number of recent incidents. In this work, we explore the security of paper voting and show that paper voting, as it is implemented today, is surprisingly vulnerable to cyber-attacks. In particular, the aggregation methods of preliminary voting results of various countries rely on insecure communication channels like telephone, fax or non-secure e-mail. Furthermore, regulations typically do not mandate the use of secure channels for the transmission of preliminary results. We illustrate that preliminary results, despite ...
Subjects
free text keywords: Computer Science - Cryptography and Security
Download from
41 references, page 1 of 3

[1] abraxas Informatik AG. Wahlen - Lösung für Wahlen und Abstimmungen. https://www.abraxas.ch/de/ loesungen/fachanwendungen/wahlen, 2019.

[2] Diego F. Aranha, Helder Ribeiro, and André Luis Ogando Paraense. Crowdsourced integrity verification of election results. Annals of Telecommunications, 71(7):287-297, 2016.

[3] Jonathan Bannet, David W Price, Algis Rudys, Justin Singer, and Dan S Wallach. Hack-a-vote: Security issues with electronic voting systems. IEEE Security & Privacy, 2(1):32-37, 2004.

[4] Bedag Informatik AG. Bedag-Wahllösung BEWAS erfolgreich in den Gemeinden gestartet. https://www.bedag.ch/wAssets/docs/Aktuell/ Medienmitteilungen/Medienmitteilung_17.12.

2018_BEWAS.pdf, 2018.

[5] Mike Bird. The Swiss Gold Referendum Was Just a Storm in a Teacup. Kitco, December 2014.

[11] Deutschland. Bundeswahlordnung, June 2017.

[12] Mona Dhole. Gold price drops as swiss vote no. InvestmentEurope, December 2014.

[13] Die Bundesversammlung der Schweizerischen Eidgenossenschaft. Bundesgesetz über die politischen Rechte, 2015.

[14] Tim Dierks and Eric Rescorla. The transport layer security (TLS) protocol version 1.2. Technical report, 2008.

[15] Whitfield Diffie and Martin Hellman. New directions in cryptography. IEEE transactions on Information Theory, 22(6):644-654, 1976.

[16] Etat du Valais. Login adminVotel. adminvotel.vs.ch, 2019.

[22] Paul Kocher, Joshua Jaffe, and Benjamin Jun. Differential power analysis. In Annual International Cryptology Conference, pages 388-397. Springer, 1999.

[23] Sanjay Kumar and Ekta Walia. Analysis of electronic voting system in various countries. International Journal on Computer Science and Engineering, 3(5):1825- 1830, 2011.

[24] Leontine Loeber and Dutch Electoral Council. E-voting in the Netherlands; from general acceptance to general doubt in two years. Electronic voting, 131:21-30, 2008.

41 references, page 1 of 3
Powered by OpenAIRE Research Graph
Any information missing or wrong?Report an Issue