|
Welcome to my talk and thank you very much fort he invitation and thus the possibility to present our work on the evaluation and certification of electronic voting systems and in particular remote electronic voting systems (also called online voting products). According to the document which will be introduced and proposed with this presentation, the talk has the title "Common Criteria Protection Profile -- a Basic Set of Security Requirements for Online Voting Products". The Protection Profile does not serve as a new requirement catalogue beside all this existing ones but as an improvement which overcomes the vulnerabilities of existing catalogues. These vulnerabilities result from the fact that existing requirement catalogues only provides different kind of requirements which the electronic voting system needs to ensure, while they do not specify how to evaluate that a system meets theses requirements. This means in particular that existing catalogues do not make the underlying trust model explicit – meaning the assumptions and conditions to the environment (in which the system is used) are not specified. Moreover, the existing catalogues do not define the evaluation depth. This means it is not clear whether the conformance decision should be based on conversation with the developers or a documentation and specification review, or it should be based on a source code analysis or even a mathematical proof. From these vulnerabilities result that the evaluation result is neither meaningful nor are the results comparable. To overcome these problems, we propose the application of the Common Criteria – (CC) and, thus, translated existing requirement catalogues into a Protection Profile. The CC is an international standard for Information Technology Security Evaluation which is applied in many countries. Protection Profiles are one of the most important documents which can be developed based on the Common Criteria. They describe a system independent set of security requirements for a category of systems. Thus, a PP serves as quasi standard for a group of systems – here for different types of remote electronic voting systems.
When we started our project we believed that we can develop one general protection profile which is applicable for any kind of elections independent from the level and the country. But then we recognized that such a Protection Profile cannot exist – as the trust model and the required evaluation depth differs from election to election and probably also form country to country. Thus, we decided to develop a basis Protection Profile which needs to be ensured by all remote electronic voting systems but this basis can and should be extended by the election authorities.
Any PP needs to contain several different issues. For election authorities only two parts are important to know as they need to check whether they agree on these issues: There is on the one hand the security problem definition section describing the trust model and on the other hand the security assurance requirements defining the evaluation depth. The rest of the document is written in the Common Criteria language and needs to be extended – if necessary – by a Common Criteria expert.
We developed this Common Criteria Protection Profile describing a basic requirement. Now it is the responsibility of the election authorities to decide whether the defined trust model in terms of the security problem definition of the basic PP fit to their environment and the type of election they have in mind. Moreover, it has to be decided concerning the evaluation depth whether EAL 2+ provides enough trust in the evaluation system. If not they are free to extend this basic PP – either by shifting assumptions to threats and thus to demand more security functionality from the evaluated systems or by arising the EAL level. We look forward to the result of an extended version.
Finally, I would like to point out that we do not think that such a PP can replace the valuable recommendations from the Council of Europe, as it provides so much more requirements than only security ones related to the voting software. Thus, we see the Protection Profile as an add-on to guide the security evaluation of a remote electronic voting system. |