Time-Lock Puzzles and Timed-Release Crypto

Total Page:16

File Type:pdf, Size:1020Kb

Time-Lock Puzzles and Timed-Release Crypto Timelo ck puzzles and timedrelease Crypto Ronald L Rivest Adi Shamir and DavidAWagner Revised March MIT Lab oratory for Computer Science Technology Square Cambridge Mass Weizmann Institute of Science Applied Mathematics Department Rehovot Israel Computer Science Department UC Berkeley Berkeley California frivestshamirgtheorylcsmitedu dawcsberkeleyedu Intro duction Our motivation is the notion of timedrelease crypto where the goal is to encrypt a message so that it can not b e decrypted byanyone not even the sender until a predetermined amount of time has passed The goal is to send information into the future This problem was rst discussed by TimothyMay What are the applications of timedrelease crypto Here are a few p ossibilities some due to May A bidder in an auction wants to seal his bid so that it can only b e op ened after the bidding p erio d is closed A homeowner wants to give his mortgage holder a series of encrypted mortgage pay ments These might b e encrypted digital cash with dierent decryption dates so that one payment b ecomes decryptable and thus usable by the bank at the b eginning of each successive month An individual wants to encrypt his diaries so that they are only decryptable after fty years Akeyescrowscheme can b e based on timedrelease crypto so that the government can get the message keys but only after a xed p erio d say one year There are presumably many other applications There are two natural approaches to implementing timedrelease crypto Use timelo ck puzzlescomputational problems that can not b e solved without run ning a computer continuously for at least a certain amountoftime Use trusted agents who promise not to reveal certain information until a sp ecied date Using trusted agents has the obvious problem of ensuring that the agents are trustworthy secretsharing approaches can b e used to alleviate this concern Using timelo ck puzzles has the problem that the CPU time required to solve a problem can dep end on the amount and nature of the hardware used to solve the problem as well as the parallelizabilityofthe computational problem b eing solved In this note we explore b oth approaches We note that Tim May has suggested an approach based on the use of trusted agents Timelo ck puzzles We rst explore an approach based on computational complexity we study the problem of creating computational puzzles called timelo ck puzzles that require a precise amount of time to solve The solution to the puzzle reveals a key that can b e used to decrypt the encrypted information This approach has the obvious problem of trying to makeCPU time and real time agree as closely as p ossible but is nonetheless interesting The ma jor dicultytobeovercome as noted ab ove is that those with more compu tational resources mightbeabletosolve the timelo ck puzzle more quicklyby using large parallel computers for example Our goal is thus to design timelo ck puzzles that to the greatest extent p ossible are instrinsically sequential in nature and can not b e solved substantially faster with large investments in hardware In particular wewant our puzzles to have the prop erty that putting computers to work together in parallel do esnt sp eed up nding the solution Solving the puzzle should b e likehaving a baby twowomen cant havea baby in months We prop ose an approach to building puzzles that app ears to b e intrisically sequential in the desired manner Of course our approach yields puzzles with a solution time that is only approximately controllable since dierent computers work at dierentspeedsFor example the underlying technology may b e dierent gallium arsenide gates are faster than silicon gates If precise timing of the information release is essential an approach based on the use of trusted agents is preferable We also note that with our approach the puzzle do esnt automatically b ecome solvable at a given time rather a computer needs work continuously on the puzzle until it is solved A tenyear puzzle needs some dedicated workstation working away for ten years to solve it If the computing do esnt start until veyears after the puzzle was made then the solution wont b e found until ten years after that p erhaps a bit less if technology has improved in the meantime Our approach therefore requires much more in the wayof computational resources than an approach based on trusted agents and thus maybebest suited for relatively simple puzzles with timetosolution under a month say Nonetheless we feel that our approach has sucient utility to merit this exp osition An unworkable approach We b egin by presenting an approach that doesnt work well Let M denote the information to b e encrypted for a p erio d of time Let S denote the sp eed of a workstation measured in decryptions p er second Then to encrypt M to b e decryptable after T seconds wecho ose a conventional cryptosystem sayRC with a key size of approximately k lgST bits and encrypt M with a k bit keyWesave the ciphertext and throwawaythekey By using exhaustive searchofthekey space a workstation will take ab out T seconds on the average to nd the key We note that Merkle was the rst to suggest this metho d of designing puzzles and was also the rst to intro duce the notion of a puzzle in research that ultimately led to the invention of the concept of publickey cryptography There are two problems with this way of building a timelo ckpuzzleby encrypting M with a conventional cipher A bruteforce keysearch is trivially parallelizable so that N computers make the com putation run N times faster The computation time estimate of T seconds is only an exp ected running time the actual running time could b e signicantly larger or smaller dep ending on the order in which the keys are examined These problems are xed in the prop osal given next Creating a timelo ck puzzle Wenow show a metho d for creating timelo ck puzzles based on rep eated squaring Our approach can also b e viewed as an application of the randomaccess prop ertyofthe BlumBlumShub x mo d n pseudorandom numb er generator We actually prop ose ascheme that is a variation on the x mo d n generator but the dierences are nonessential and the original scheme could have b een used as well here An early version of our pap er suggested a dierent approach based on sup erencryption in RSA the current approach is considerably simpler Here is our approach Supp ose Alice has a message M that she wants to encrypt with a timelo ck puzzle for a p erio d of T seconds She generates a comp osite mo dulus n pq as the pro duct of two large randomlychosen secret primes p and q She also computes np q She computes t TS where S is the numb er of squarings mo dulo n p er second that can b e p erformed by the solver She generates a random key K for a conventional cryptosystem suchasRC This key is long enough say bits or more that searching for it is infeasible even with the advances in computing p ower exp ected during the lifetime of the puzzle She encrypts M with key K and encryption algorithm RC to obtain the ciphertext C RC K M M She picks a random a mo dulo n with an and encrypts K as t C K a mo d n K To do this eciently she rst computes t e mo d n and then computes e b a mo d n She pro duces as output the timelo ckpuzzlen a t C C and erases anyother K M variables suchas p q created during this computation We add as a technical fo otnote here the remark that p q and a can b e chosen carefully so that is guaranteed to have a large order mo dulo n and so that a is guaranteed to have a large order mo dulo n See Blum Blum and Shub for some relevant discussion However cho osing p q and a randomly should give the desired level of dicultywithoverwhelming probability so that these precautions are not exp ected to b e necessary in practice Indeed in practice cho osing a xed value a should b e safe with high probability Since there are other risks in the whole approach eg an adversary could just guess K aiming for p erfection in the numb ertheory is probably overkill Solving the puzzle By design searching for the RC key K directly is infeasible so the fastest known approach to solving the puzzle is to determine t mo d n b a t somehow Knowing n enables to b e reduced eciently to e mo dulo n so that b can b e computed eciently by equation However computing nfromn is provably as hard as factoring n so that once Alice publishes the puzzle and throws away the key throws away the factors p and q there seems to b e no faster way of computing b than to start with a and p erform t squarings sequentially each time squaring the previous result While factoring n is certainly an alternativeattack for solving the puzzle when p and q are large enough the factoring approach is far less ecient than rep eated squaring The number t of squarings required to solve the puzzle can b e exactly controlled Thus we can create puzzles of various desired levels of diculty More imp ortantly rep eated squaring seems to b e an intrinsically sequential pro cess We knowofnoobvious way to parallelize it to any large degree A small amountof parallelization may b e p ossible within each squaring Having many computers is no b etter than having one But having one fast computer is b etter than one slow one The degree of variation in how long it mighttaketosolve the puzzle dep ends on the variation in the sp eed of single computers and not on ones total budget Since the sp eed of hardware available to individual consumers is within a small constant factor of what is available to large intelligence organizations
Recommended publications
  • Butler Lampson, Martin Abadi, Michael Burrows, Edward Wobber
    Outline • Chapter 19: Security (cont) • A Method for Obtaining Digital Signatures and Public-Key Cryptosystems Ronald L. Rivest, Adi Shamir, and Leonard M. Adleman. Communications of the ACM 21,2 (Feb. 1978) – RSA Algorithm – First practical public key crypto system • Authentication in Distributed Systems: Theory and Practice, Butler Lampson, Martin Abadi, Michael Burrows, Edward Wobber – Butler Lampson (MSR) - He was one of the designers of the SDS 940 time-sharing system, the Alto personal distributed computing system, the Xerox 9700 laser printer, two-phase commit protocols, the Autonet LAN, and several programming languages – Martin Abadi (Bell Labs) – Michael Burrows, Edward Wobber (DEC/Compaq/HP SRC) Oct-21-03 CSE 542: Operating Systems 1 Encryption • Properties of good encryption technique: – Relatively simple for authorized users to encrypt and decrypt data. – Encryption scheme depends not on the secrecy of the algorithm but on a parameter of the algorithm called the encryption key. – Extremely difficult for an intruder to determine the encryption key. Oct-21-03 CSE 542: Operating Systems 2 Strength • Strength of crypto system depends on the strengths of the keys • Computers get faster – keys have to become harder to keep up • If it takes more effort to break a code than is worth, it is okay – Transferring money from my bank to my credit card and Citibank transferring billions of dollars with another bank should not have the same key strength Oct-21-03 CSE 542: Operating Systems 3 Encryption methods • Symmetric cryptography – Sender and receiver know the secret key (apriori ) • Fast encryption, but key exchange should happen outside the system • Asymmetric cryptography – Each person maintains two keys, public and private • M ≡ PrivateKey(PublicKey(M)) • M ≡ PublicKey (PrivateKey(M)) – Public part is available to anyone, private part is only known to the sender – E.g.
    [Show full text]
  • Rivest, Shamir, and Adleman Receive 2002 Turing Award, Volume 50
    Rivest, Shamir, and Adleman Receive 2002 Turing Award Cryptography and Information Se- curity Group. He received a B.A. in mathematics from Yale University and a Ph.D. in computer science from Stanford University. Shamir is the Borman Profes- sor in the Applied Mathematics Department of the Weizmann In- stitute of Science in Israel. He re- Ronald L. Rivest Adi Shamir Leonard M. Adleman ceived a B.S. in mathematics from Tel Aviv University and a Ph.D. in The Association for Computing Machinery (ACM) has computer science from the Weizmann Institute. named RONALD L. RIVEST, ADI SHAMIR, and LEONARD M. Adleman is the Distinguished Henry Salvatori ADLEMAN as winners of the 2002 A. M. Turing Award, Professor of Computer Science and Professor of considered the “Nobel Prize of Computing”, for Molecular Biology at the University of Southern their contributions to public key cryptography. California. He earned a B.S. in mathematics at the The Turing Award carries a $100,000 prize, with University of California, Berkeley, and a Ph.D. in funding provided by Intel Corporation. computer science, also at Berkeley. As researchers at the Massachusetts Institute of The ACM presented the Turing Award on June 7, Technology in 1977, the team developed the RSA 2003, in conjunction with the Federated Computing code, which has become the foundation for an en- Research Conference in San Diego, California. The tire generation of technology security products. It award was named for Alan M. Turing, the British mathematician who articulated the mathematical has also inspired important work in both theoret- foundation and limits of computing and who was a ical computer science and mathematics.
    [Show full text]
  • Cryptography: DH And
    1 ì Key Exchange Secure Software Systems Fall 2018 2 Challenge – Exchanging Keys & & − 1 6(6 − 1) !"#ℎ%&'() = = = 15 & 2 2 The more parties in communication, ! $ the more keys that need to be securely exchanged Do we have to use out-of-band " # methods? (e.g., phone?) % Secure Software Systems Fall 2018 3 Key Exchange ì Insecure communica-ons ì Alice and Bob agree on a channel shared secret (“key”) that ì Eve can see everything! Eve doesn’t know ì Despite Eve seeing everything! ! " (alice) (bob) # (eve) Secure Software Systems Fall 2018 Whitfield Diffie and Martin Hellman, 4 “New directions in cryptography,” in IEEE Transactions on Information Theory, vol. 22, no. 6, Nov 1976. Proposed public key cryptography. Diffie-Hellman key exchange. Secure Software Systems Fall 2018 5 Diffie-Hellman Color Analogy (1) It’s easy to mix two colors: + = (2) Mixing two or more colors in a different order results in + + = the same color: + + = (3) Mixing colors is one-way (Impossible to determine which colors went in to produce final result) https://www.crypto101.io/ Secure Software Systems Fall 2018 6 Diffie-Hellman Color Analogy ! # " (alice) (eve) (bob) + + $ $ = = Mix Mix (1) Start with public color ▇ – share across network (2) Alice picks secret color ▇ and mixes it to get ▇ (3) Bob picks secret color ▇ and mixes it to get ▇ Secure Software Systems Fall 2018 7 Diffie-Hellman Color Analogy ! # " (alice) (eve) (bob) $ $ Mix Mix = = Eve can’t calculate ▇ !! (secret keys were never shared) (4) Alice and Bob exchange their mixed colors (▇,▇) (5) Eve will
    [Show full text]
  • Magnetic RSA
    Magnetic RSA Rémi Géraud-Stewart1;2 and David Naccache2 1 QPSI, Qualcomm Technologies Incorporated, USA [email protected] 2 ÉNS (DI), Information Security Group CNRS, PSL Research University, 75005, Paris, France [email protected] Abstract. In a recent paper Géraud-Stewart and Naccache [GSN21] (GSN) described an non-interactive process allowing a prover P to con- vince a verifier V that a modulus n is the product of two randomly generated primes (p; q) of about the same size. A heuristic argument conjectures that P cannot control p; q to make n easy to factor. GSN’s protocol relies upon elementary number-theoretic properties and can be implemented efficiently using very few operations. This contrasts with state-of-the-art zero-knowledge protocols for RSA modulus proper generation assessment. This paper proposes an alternative process applicable in settings where P co-generates a modulus n “ p1q1p2q2 with a certification authority V. If P honestly cooperates with V, then V will only learn the sub-products n1 “ p1q1 and n2 “ p2q2. A heuristic argument conjectures that at least two of the factors of n are beyond P’s control. This makes n appropriate for cryptographic use provided that at least one party (of P and V) is honest. This heuristic argument calls for further cryptanalysis. 1 Introduction Several cryptographic protocols rely on the assumption that an integer n “ pq is hard to factor. This includes for instance RSA [RSA78], Rabin [Rab79], Paillier [Pai99] or Fiat–Shamir [FS86]. One way to ascertain that n is such a product is to generate it oneself; however, this becomes a concern when n is provided by a third-party.
    [Show full text]
  • Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University
    Diffie and Hellman Receive 2015 Turing Award Rod Searcey/Stanford University. Linda A. Cicero/Stanford News Service. Whitfield Diffie Martin E. Hellman ernment–private sector relations, and attracts billions of Whitfield Diffie, former chief security officer of Sun Mi- dollars in research and development,” said ACM President crosystems, and Martin E. Hellman, professor emeritus Alexander L. Wolf. “In 1976, Diffie and Hellman imagined of electrical engineering at Stanford University, have been a future where people would regularly communicate awarded the 2015 A. M. Turing Award of the Association through electronic networks and be vulnerable to having for Computing Machinery for their critical contributions their communications stolen or altered. Now, after nearly to modern cryptography. forty years, we see that their forecasts were remarkably Citation prescient.” The ability for two parties to use encryption to commu- “Public-key cryptography is fundamental for our indus- nicate privately over an otherwise insecure channel is try,” said Andrei Broder, Google Distinguished Scientist. fundamental for billions of people around the world. On “The ability to protect private data rests on protocols for a daily basis, individuals establish secure online connec- confirming an owner’s identity and for ensuring the integ- tions with banks, e-commerce sites, email servers, and the rity and confidentiality of communications. These widely cloud. Diffie and Hellman’s groundbreaking 1976 paper, used protocols were made possible through the ideas and “New Directions in Cryptography,” introduced the ideas of methods pioneered by Diffie and Hellman.” public-key cryptography and digital signatures, which are Cryptography is a practice that facilitates communi- the foundation for most regularly used security protocols cation between two parties so that the communication on the Internet today.
    [Show full text]
  • The Best Nurturers in Computer Science Research
    The Best Nurturers in Computer Science Research Bharath Kumar M. Y. N. Srikant IISc-CSA-TR-2004-10 http://archive.csa.iisc.ernet.in/TR/2004/10/ Computer Science and Automation Indian Institute of Science, India October 2004 The Best Nurturers in Computer Science Research Bharath Kumar M.∗ Y. N. Srikant† Abstract The paper presents a heuristic for mining nurturers in temporally organized collaboration networks: people who facilitate the growth and success of the young ones. Specifically, this heuristic is applied to the computer science bibliographic data to find the best nurturers in computer science research. The measure of success is parameterized, and the paper demonstrates experiments and results with publication count and citations as success metrics. Rather than just the nurturer’s success, the heuristic captures the influence he has had in the indepen- dent success of the relatively young in the network. These results can hence be a useful resource to graduate students and post-doctoral can- didates. The heuristic is extended to accurately yield ranked nurturers inside a particular time period. Interestingly, there is a recognizable deviation between the rankings of the most successful researchers and the best nurturers, which although is obvious from a social perspective has not been statistically demonstrated. Keywords: Social Network Analysis, Bibliometrics, Temporal Data Mining. 1 Introduction Consider a student Arjun, who has finished his under-graduate degree in Computer Science, and is seeking a PhD degree followed by a successful career in Computer Science research. How does he choose his research advisor? He has the following options with him: 1. Look up the rankings of various universities [1], and apply to any “rea- sonably good” professor in any of the top universities.
    [Show full text]
  • The RSA Algorithm
    The RSA Algorithm Evgeny Milanov 3 June 2009 In 1978, Ron Rivest, Adi Shamir, and Leonard Adleman introduced a cryptographic algorithm, which was essentially to replace the less secure National Bureau of Standards (NBS) algorithm. Most impor- tantly, RSA implements a public-key cryptosystem, as well as digital signatures. RSA is motivated by the published works of Diffie and Hellman from several years before, who described the idea of such an algorithm, but never truly developed it. Introduced at the time when the era of electronic email was expected to soon arise, RSA implemented two important ideas: 1. Public-key encryption. This idea omits the need for a \courier" to deliver keys to recipients over another secure channel before transmitting the originally-intended message. In RSA, encryption keys are public, while the decryption keys are not, so only the person with the correct decryption key can decipher an encrypted message. Everyone has their own encryption and decryption keys. The keys must be made in such a way that the decryption key may not be easily deduced from the public encryption key. 2. Digital signatures. The receiver may need to verify that a transmitted message actually origi- nated from the sender (signature), and didn't just come from there (authentication). This is done using the sender's decryption key, and the signature can later be verified by anyone, using the corresponding public encryption key. Signatures therefore cannot be forged. Also, no signer can later deny having signed the message. This is not only useful for electronic mail, but for other electronic transactions and transmissions, such as fund transfers.
    [Show full text]
  • Cache Timing Side-Channel Vulnerability Checking With
    Cache Timing Side-Channel Vulnerability Checking with Computation Tree Logic Shuwen Deng, Wenjie Xiong and Jakub Szefer Yale University New Haven, Connecticut {shuwen.deng,wenjie.xiong,jakub.szefer}@yale.edu ABSTRACT can then be used to leak secrets of a victim program, and this has Caches are one of the key features of modern processors as they been exploited by the various cache timing side-channel attacks, help to improve memory access timing through caching recently e.g., [1, 5, 7, 21, 30]. used data. However, due to the timing dierences between cache To address the security issues of cache timing side-channel at- hits and misses, numerous timing side-channels have been discov- tacks, numerous secure processor caches have been designed and ered and exploited in the past. In this paper, Computation Tree analyzed through simulation and probability analysis in attempt Logic is used to model execution paths of the processor cache logic, to prove that the proposed caches indeed prevent attacks [12, 13, and to derive formulas for paths that can lead to timing side-channel 26, 27, 33–36, 39, 40]. Furthermore, to reason about the dierent vulnerabilities. In total, 28 types of cache attacks are presented: 20 attacks, researchers have classied cache timing side-channels on types of which map to attacks previously categorized or discussed basis whether the attacks leverage cache hits or misses and whether in literature, and 8 types are new. Furthermore, to enable practical they are access-based or reuse-based, and whether the attacks lever- vulnerability checking, we present a new approach that limits the age internal or external interference [22, 41].
    [Show full text]
  • Rsa and Rabin Functions: Certain Parts Are As Hard As the Whole*
    SIAM J. COMPUT. (C) 1988 Society for Industrial and Applied Mathematics Vol. 17, No. 2, April 1988 0O2 RSA AND RABIN FUNCTIONS: CERTAIN PARTS ARE AS HARD AS THE WHOLE* WERNER ALEXI, BENNY CHOR$, ODED GOLDREICH AND CLAUS P. SCHNORR' Abstract. The RSA and Rabin encryption functions EN(" are respectively defined by raising x ZN to the power e (where e is relatively prime to q(N)) and squaring modulo N (i.e., En(x)- x (mod N), En(x)-- x (mod N), respectively). We prove that for both functions, the following problems are computa- tionally equivalent (each is probabilistic polynomial-time reducible to the other): (1) Given E (x), find x. (2) Given EN(x), guess the least-significant bit of x with success probability 1/2+ 1/poly (n) (where n is the length of the modulus N). This equivalence implies that an adversary, given the RSA/Rabin ciphertext, cannot have a non-negligible advantage (over a random coin flip) in guessing the least-significant bit of the plaintext, unless he can invert RSA/factor N. The proof techniques also yield the simultaneous security of the log n least-significant bits. Our results improve the efficiency of pseudorandom number generation and probabilistic encryption schemes based on the intractability of factoring. Key words, cryptography, concrete complexity, RSA encryption, factoring integers, partial information, predicate reductions AMS(MOS) subject classifications, llA51, 11K45, llT71, llY05, llX16, llZS0, 68Q99, 94A60 1. Introduction. One-way functions are the basis for modern cryptography [11] and have many applications to pseudorandomness and complexity theories [6], [29].
    [Show full text]
  • The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories
    The Mathematics of the RSA Public-Key Cryptosystem Burt Kaliski RSA Laboratories ABOUT THE AUTHOR: Dr Burt Kaliski is a computer scientist whose involvement with the security industry has been through the company that Ronald Rivest, Adi Shamir and Leonard Adleman started in 1982 to commercialize the RSA encryption algorithm that they had invented. At the time, Kaliski had just started his undergraduate degree at MIT. Professor Rivest was the advisor of his bachelor’s, master’s and doctoral theses, all of which were about cryptography. When Kaliski finished his graduate work, Rivest asked him to consider joining the company, then called RSA Data Security. In 1989, he became employed as the company’s first full-time scientist. He is currently chief scientist at RSA Laboratories and vice president of research for RSA Security. Introduction Number theory may be one of the “purest” branches of mathematics, but it has turned out to be one of the most useful when it comes to computer security. For instance, number theory helps to protect sensitive data such as credit card numbers when you shop online. This is the result of some remarkable mathematics research from the 1970s that is now being applied worldwide. Sensitive data exchanged between a user and a Web site needs to be encrypted to prevent it from being disclosed to or modified by unauthorized parties. The encryption must be done in such a way that decryption is only possible with knowledge of a secret decryption key. The decryption key should only be known by authorized parties. In traditional cryptography, such as was available prior to the 1970s, the encryption and decryption operations are performed with the same key.
    [Show full text]
  • A Memorable Trip Abhisekh Sankaran Research Scholar, IIT Bombay
    A Memorable Trip Abhisekh Sankaran Research Scholar, IIT Bombay It was my first trip to the US. It had not yet sunk in that I had been chosen by ACM India as one of two Ph.D. students from India to attend the big ACM Turing Centenary Celebration in San Francisco until I saw the familiar face of Stephen Cook enter a room in the hotel a short distance from mine; later, Moshe Vardi recognized me from his trip to IITB during FSTTCS, 2011. I recognized Nitin Saurabh from IMSc Chennai, the other student chosen by ACM-India; 11 ACM SIG©s had sponsored students and there were about 75 from all over the world. Registration started at 8am on 15th June, along with breakfast. Collecting my ©Student Scholar© badge and stuffing in some food, I entered a large hall with several hundred seats, a brightly lit podium with a large screen in the middle flanked by two others. The program began with a video giving a brief biography of Alan Turing from his boyhood to the dynamic young man who was to change the world forever. There were inaugural speeches by John White, CEO of ACM, and Vint Cerf, the 2004 Turing Award winner and incoming ACM President. The MC for the event, Paul Saffo, took over and the panel discussions and speeches commenced. A live Twitter feed made it possible for people in the audience and elsewhere to post questions/comments which were actually taken up in the discussions. Of the many sessions that took place in the next two days, I will describe three that I found most interesting.
    [Show full text]
  • RON RIVEST Viterbi Professor of Computer Science, MIT's Department of Electrical Engineering and Computer Science
    Feb 1st 10:30 am - noon, Newcomb Hall, South Meeting Room RON RIVEST Viterbi Professor of Computer Science, MIT's Department of Electrical Engineering and Computer Science Security of Voting Systems While running an election sounds simple, it is in fact extremely challenging. Not only are there millions of voters to be authenticated and millions of votes to be carefully collected, count- ed, and stored, there are now millions of "voting machines" containing millions of lines of code to be evaluated for security vulnerabilities. Moreover, voting systems have a unique requirement: the voter must not be given a "receipt" that would allow them to prove how they voted to some- one else---otherwise the voter could be coerced or bribed into voting a certain way. The lack of receipts makes the security of voting system much more challenging than, say, the security of banking systems (where receipts are the norm). We discuss some of the recent trends and innovations in voting systems, as well as some of the new requirements being placed upon voting systems in the U.S., and describe some promising directions for resolving the conflicts inherent in voting system requirements, including some approaches based on cryptography. Professor Rivest is the Viterbi Professor of Computer Science in MIT's Department of Electrical Engineering and Computer Science. He is a member of MIT's Computer Science and Artificial Intelligence Laboratory, and Head of its Center for Information Security and Privacy. Professor Rivest has research interests in cryptography, computer and network security, and algo- rithms. Professor Rivest is an inventor, with Adi Shamir and Len Adleman of the RSA public-key cryp- tosystem, and a co-founder of RSA Data Security.
    [Show full text]