[149162] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] cheap sources of entropy

daemon@ATHENA.MIT.EDU (Jonathan Thornburg)
Tue Jan 21 13:33:01 2014

X-Original-To: cryptography@metzdowd.com
Date: Tue, 21 Jan 2014 08:13:16 +0000
From: Jonathan Thornburg <jthorn@astro.indiana.edu>
To: cryptography@metzdowd.com
In-Reply-To: <r422Ps-1075i-774A5D40C7544BD0B8C1D193A69C7210@Williams-MacBook-Pro.local>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

Bill Frantz wrote:
> Note that paper and human voting systems have been successfully
> attacked. My favorite attack occurred in Chicago in the mid-20th
> century. Ballot counters from one party glued pencil leads under
> their fingernails. When they counted a ballot for the "wrong"
> candidate, they marked an X for the correct candidate as well,
> thereby invalidating the ballot.

However -- and very much *unlike* electronic voting systems -- given
opposition-party scruitineers watching the counting process (and by
"watching" I mean literally looking over the shoulders of the ballot
counters), it's very hard to do such an attack on a *large scale* in
*secret*.

-- 
-- "Jonathan Thornburg [remove -animal to reply]" <jthorn@astro.indiana-zebra.edu>
   Dept of Astronomy & IUCSS, Indiana University, Bloomington, Indiana, USA
   "There was of course no way of knowing whether you were being watched
    at any given moment.  How often, or on what system, the Thought Police
    plugged in on any individual wire was guesswork.  It was even conceivable
    that they watched everybody all the time."  -- George Orwell, "1984"
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post