Attacking the verification code mechanism in the norwegian internet voting system

  • Authors:
  • Reto E. Koenig;Philipp Locher;Rolf Haenni

  • Affiliations:
  • Bern University of Applied Sciences, Biel, Switzerland;Bern University of Applied Sciences, Biel, Switzerland;Bern University of Applied Sciences, Biel, Switzerland

  • Venue:
  • Vote-ID'13 Proceedings of the 4th international conference on E-Voting and Identity
  • Year:
  • 2013

Quantified Score

Hi-index 0.00

Visualization

Abstract

The security of the Norwegian Internet voting system depends strongly on the implemented verification code mechanism, which allows voters to verify if their vote has been cast and recorded as intended. For this to work properly, a secure and independent auxiliary channel for transmitting the verification codes to the voters is required. The Norwegian system assumes that SMS satisfies the necessary requirements for such a channel. This paper demonstrates that this is no longer the case today. If voters use smartphones or tablet computers for receiving SMS messages, a number of new attack scenarios appear. We show how an adversary may exploit these scenarios in systems providing vote updating and point out the consequences for the vote integrity in the Norwegian system. We also give a list of possible counter-measures and system enhancements to prevent and detect such attacks.