Главная
Study mode:
on
1
Intro
2
What kind of election?
3
Not exactly a peaceful context
4
Public test of the system
5
Timeline of Summer 2019
6
A triple-EIGamal (encryption)
7
First attack: solve DLP
8
Encryption fixed. Problem solved?
9
Overview of the protocol
10
Role of the encryption
11
Further remarks
12
Impact of our findings
13
Nationwide voting on constitutional amendments
14
System used?
15
Nothing to report?
16
Conclusion?
Description:
Explore the vulnerabilities in Moscow's Internet voting system through a detailed presentation given at the Workshop on Attacks in Cryptography (WAC) 2020. Delve into the context of the election, the public testing process, and the timeline of events in Summer 2019. Examine the triple-ElGamal encryption method used and the first attack involving solving the Discrete Logarithm Problem (DLP). Analyze the subsequent encryption fix and its effectiveness. Gain insights into the protocol overview, the role of encryption, and additional observations. Assess the impact of the findings on nationwide voting for constitutional amendments. Evaluate the system's usage and reported issues before drawing conclusions about the security and integrity of Moscow's Internet voting infrastructure.

Weaknesses in the Moscow Internet Voting System

TheIACR
Add to list
0:00 / 0:00