Thursday, April 15, 2021
  • Setup menu at Appearance » Menus and assign menu to Top Bar Navigation
Advertisement
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News
No Result
View All Result
NikolaNews
No Result
View All Result
Home Internet Security

NSW Electoral Commission claims it is safe from second SwissVote flaw

March 25, 2019
in Internet Security
NSW Electoral Commission claims it is safe from second SwissVote flaw
585
SHARES
3.3k
VIEWS
Share on FacebookShare on Twitter

The New South Wales Electoral Commission (NSWEC) has released a statement in response to a group of researchers detailing a second flaw in the electronic voting system it uses, saying it is confident it has not been affected.

Security researchers Sarah Jamie Lewis, Olivier Pereira, and Vanessa Teague described the new flaw that could allow vote tampering in the Swiss Internet voting system, which is the same system used by NSWEC.

You might also like

Cyber criminals are installing cryptojacking malware on unpatched Microsoft Exchange servers

ASIO boss says he’s not concerned with Australian Parliament’s March outage

‘FLoC off!’ Vivaldi declares as it says no to Google’s tracking system

The researchers, who earlier this month found a flaw in the proof the SwissPost system uses to prevent electoral fraud, have discovered another method that could be exploited to result in a tampered election outcome.

“We have recently discovered a second, independent method by which a proof mechanism in sVote could be subverted to prove an election outcome that has actually been manipulated,” they wrote.

The second flaw follows the first, which was essentially a trapdoor — a flaw in the mixnet component that shuffles votes in an effort to remove the ability to link votes to individual electors.

According to the researchers, the SwissPost system offers one form of verifiability, called complete verifiability, which means that any manipulation should be detectable unless all but one part of the system colludes to cheat.

“In the SwissPost system, encrypted electronic votes are shuffled to protect individual vote privacy. Each server shuffling votes is supposed to prove that the set of input votes it gets correspond exactly to the differently-encrypted votes it outputs,” they continued.

The next step after shuffling, the researchers explained, is decrypting the votes. But the cryptographic construct in place for the Swissvote System, a zero knowledge proof, has now been highlighted by the researchers as “not sound”.

“Our research has found that this proof is not sound. It’s possible to generate a proof that passes verification, but changes the contents of the encrypted vote,” they said. “It’s a little like leaving the ballot box observable all through polling day, yet somehow managing to slip different votes into the count.”

After hearing of the second flaw, NSWEC said its system has not been affected.

“Based on its assessment of the information supplied by these academics, the NSW Electoral Commission is confident that the new issue they describe in the Swiss Post system is not relevant to the iVote system,” the state government entity said.

It also previously claimed it was unaffected by the first flaw because its mixnet was not connected to any systems and was “securely housed” at the NSWEC.

NSWEC said a patch addressing the first issue has been installed.

The Commission said on Saturday that over 207,000 people had used iVote for the NSW state election.

The researchers took the opportunity to highlight that it only became aware of the issues potentially affecting the iVote system thanks to the code used by the Swiss system being made available.

“It’s lucky that a problem in iVote could be discovered by inspecting the Swiss code, because the iVote code is available only under very restrictive terms that would not have allowed us to analyse the code and publish our findings promptly,” they wrote.

“Open, public review is important even for systems that are intended to be verifiable, because the voters and candidates need to be convinced that it will not seem to verify something that is wrong. Otherwise, the risk of undetectable electoral fraud remains, because of the risk that the verification mechanism itself might be manipulated.”

In 2015, Teague was part of a team that discovered iVote was susceptible to the FREAK vulnerability.

RELATED COVERAGE

Credit: Source link

Previous Post

Making New Drugs with a Dose of Artificial Intelligence

Next Post

COMMENTARY: Using AI and machine learning to keep market in ‘high gear’

Related Posts

Cyber criminals are installing cryptojacking malware on unpatched Microsoft Exchange servers
Internet Security

Cyber criminals are installing cryptojacking malware on unpatched Microsoft Exchange servers

April 14, 2021
ASIO boss says he’s not concerned with Australian Parliament’s March outage
Internet Security

ASIO boss says he’s not concerned with Australian Parliament’s March outage

April 14, 2021
‘FLoC off!’ Vivaldi declares as it says no to Google’s tracking system
Internet Security

‘FLoC off!’ Vivaldi declares as it says no to Google’s tracking system

April 14, 2021
Microsoft April patch download covers 114 CVEs including new Exchange Server bugs
Internet Security

Microsoft April patch download covers 114 CVEs including new Exchange Server bugs

April 14, 2021
Cybersecurity: Victims are spotting cyber attacks much more quickly – but there’s a catch
Internet Security

Cybersecurity: Victims are spotting cyber attacks much more quickly – but there’s a catch

April 14, 2021
Next Post
COMMENTARY: Using AI and machine learning to keep market in ‘high gear’

COMMENTARY: Using AI and machine learning to keep market in ‘high gear’

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

Plasticity in Deep Learning: Dynamic Adaptations for AI Self-Driving Cars

January 6, 2019
Microsoft, Google Use Artificial Intelligence to Fight Hackers

Microsoft, Google Use Artificial Intelligence to Fight Hackers

January 6, 2019

Categories

  • Artificial Intelligence
  • Big Data
  • Blockchain
  • Crypto News
  • Data Science
  • Digital Marketing
  • Internet Privacy
  • Internet Security
  • Learn to Code
  • Machine Learning
  • Marketing Technology
  • Neural Networks
  • Technology Companies

Don't miss it

Sailthru Announces Machine Learning Features for Improved Lifecycle Optimization
Machine Learning

Sailthru Announces Machine Learning Features for Improved Lifecycle Optimization

April 14, 2021
Data Labeling Service — How to Get Good Training Data for ML Project? | by ByteBridge | Apr, 2021
Neural Networks

Data Labeling Service — How to Get Good Training Data for ML Project? | by ByteBridge | Apr, 2021

April 14, 2021
The Search Engine Land Awards are open: Wednesday’s daily brief
Digital Marketing

The Search Engine Land Awards are open: Wednesday’s daily brief

April 14, 2021
Six courses to build your technology skills in 2021 – IBM Developer
Technology Companies

IBM joins Eclipse Adoptium and offers free certified JDKs with Eclipse OpenJ9 – IBM Developer

April 14, 2021
Cyber criminals are installing cryptojacking malware on unpatched Microsoft Exchange servers
Internet Security

Cyber criminals are installing cryptojacking malware on unpatched Microsoft Exchange servers

April 14, 2021
Simplify, then Add Lightness – Consolidating the Technology to Better Defend Ourselves
Internet Privacy

Simplify, then Add Lightness – Consolidating the Technology to Better Defend Ourselves

April 14, 2021
NikolaNews

NikolaNews.com is an online News Portal which aims to share news about blockchain, AI, Big Data, and Data Privacy and more!

What’s New Here?

  • Sailthru Announces Machine Learning Features for Improved Lifecycle Optimization April 14, 2021
  • Data Labeling Service — How to Get Good Training Data for ML Project? | by ByteBridge | Apr, 2021 April 14, 2021
  • The Search Engine Land Awards are open: Wednesday’s daily brief April 14, 2021
  • IBM joins Eclipse Adoptium and offers free certified JDKs with Eclipse OpenJ9 – IBM Developer April 14, 2021

Subscribe to get more!

© 2019 NikolaNews.com - Global Tech Updates

No Result
View All Result
  • AI Development
    • Artificial Intelligence
    • Machine Learning
    • Neural Networks
    • Learn to Code
  • Data
    • Blockchain
    • Big Data
    • Data Science
  • IT Security
    • Internet Privacy
    • Internet Security
  • Marketing
    • Digital Marketing
    • Marketing Technology
  • Technology Companies
  • Crypto News

© 2019 NikolaNews.com - Global Tech Updates