Breaking the encryption scheme of the Moscow Internet voting system - INRIA - Institut National de Recherche en Informatique et en Automatique Accéder directement au contenu
Communication Dans Un Congrès Année : 2020

Breaking the encryption scheme of the Moscow Internet voting system

Résumé

In September 2019, voters for the election at the Parliament of the city of Moscow were allowed to use an Internet voting system. The source code of it had been made available for public testing. In this paper we show two successful attacks on the encryption scheme implemented in the voting system. Both attacks were sent to the developers of the system, and both issues had been fixed after that. The encryption used in this system is a variant of ElGamal over finite fields. In the first attack we show that the used key sizes are too small. We explain how to retrieve the private keys from the public keys in a matter of minutes with easily available resources. When this issue had been fixed and the new system had become available for testing, we discovered that the new implementation was not semantically secure. We demonstrate how this newly found security vulnerability can be used for counting the number of votes cast for a candidate.
Fichier principal
Vignette du fichier
merger_arxiv.pdf (452.65 Ko) Télécharger le fichier
Origine : Fichiers produits par l'(les) auteur(s)
Loading...

Dates et versions

hal-02266264 , version 1 (13-08-2019)
hal-02266264 , version 2 (13-11-2019)

Identifiants

Citer

Pierrick Gaudry, Alexander Golovnev. Breaking the encryption scheme of the Moscow Internet voting system. Financial Cryptography and Data Security, 2020, Kota Kinabalu, Malaysia. pp.32-49, ⟨10.1007/978-3-030-51280-4_3⟩. ⟨hal-02266264v2⟩
361 Consultations
351 Téléchargements

Altmetric

Partager

Gmail Facebook X LinkedIn More