20.03.2013 Views

Computer Based Lottery for Yelahanka Project

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

<strong>Computer</strong> <strong>Based</strong> <strong>Lottery</strong> <strong>for</strong><br />

<strong>Yelahanka</strong> <strong>Project</strong><br />

Chandra Nath ∗<br />

January 31, 2013<br />

∗ nath@computer.org He is an Independent researcher engaged in research in in<strong>for</strong>ma-<br />

tion security, privacy, law & justice.<br />

1


Contents<br />

I Introduction 2<br />

II Complexity 2<br />

III Verification & Validation 3<br />

IV Conclusion 4<br />

Real Courage is found, not in the willingness to risk death, but in<br />

the willingness to stand, alone if necessary, against the ignorant<br />

and disapproving herd. Jon Roland, 1976<br />

It is an ironic truism that while technical luddites are most enthusiastic<br />

on computer based solutions, it is the security savvy that<br />

are extremely cautious.<br />

I INTRODUCTION<br />

This has reference to the <strong>for</strong>th-coming computerized lottery allocation of specific<br />

DSUs based on choices expressed by the allottees of AWHO <strong>Yelahanka</strong><br />

<strong>Project</strong>.<br />

I feel duty bound to appraise the security risks of the computerized lottery<br />

based solution to the problem of resource allocation since it seems to be<br />

inadequately appreciated by AWHO and its EDP team.<br />

II COMPLEXITY<br />

The very fact that the edp team accepted the task leads one to conclude that<br />

the team does not appreciate the complexity of the problem much less appreciate<br />

the risks in providing a trustable, secure and non-tamperable solution<br />

to the problem.<br />

If the team can define the following accurately, it would be the first step<br />

in convincing the allottees that their solution may be trusted compared to<br />

2


a simple visibly convincing tambola like drawing which can be convincingly<br />

understood by one and all among the allottees:<br />

1. A <strong>for</strong>mal definition of the problem & its constraints.<br />

2. A <strong>for</strong>mal definition of an ideal algorithm that satisfies the solution.<br />

3. A <strong>for</strong>mal proof of correctness.<br />

4. A protocol of how to ensure that the algorithm is not tampered with by<br />

interested agents including the agent who is organizing the draw with<br />

out having to trust the organisers blindly based on faith alone.<br />

5. A <strong>for</strong>mal validity, security and non-tamperability testing process.<br />

6. How and why a knowledgeable agent (NOT an ordinary naïvetè allottee<br />

who trusts the system blindly) should believe the validity of the system<br />

including algorithm correctness, testing adequacy and adequacy of<br />

privacy and security of the solution.<br />

III VERIFICATION & VALIDATION<br />

Please provide me all the documents which are “necessary and sufficient”<br />

to verify & validate the accuracy, non-tamperaility, privacy and security to<br />

create a level of confidence in the solution.<br />

In case the edp team finds difficulty in inferring what documents are<br />

“necessary and sufficient”, you (and we all in turn) might be able to conclude<br />

that their understanding of the complexity of a credible solution is severely<br />

limited and the Bangalore <strong>Yelahanka</strong> Part A allottes may be spared the home<br />

baked solution and in place, a simple tambola type physical draw based<br />

solution, the fairness of which can be appreciated even by the uninitiated<br />

in computer science, random numbers generation, algorithms, cryptography,<br />

privacy and security.<br />

I am a computer science professional with a M.S in <strong>Computer</strong> Science<br />

from University of Cali<strong>for</strong>nia from as far back as 1984 and taught M Tech<br />

and MCA courses in Advanced algorithms in Jawharlal Nehru University<br />

<strong>Computer</strong> Science Department and have a cryptography product of my own<br />

design and programming based on 256 bit AES to my credit as far back as<br />

2003 and my other security credentials can be verified from internet sources.<br />

3


IV CONCLUSION<br />

In conclusion, I sincerely urge the following:<br />

1. PLEASE DO NOT HOLD COMPUTER BASED RANDOM DRAW –<br />

since most are NOT computer security savvy and as such are not aware<br />

that any solution is easily tamperable and any security claimed is just<br />

farcical at best. For a Security professional like me it is evidently tamperabile<br />

and its security is questionable and the results in a computer<br />

based draw can be manipuated by a motivated, skillful professional<br />

and one with opportunity to manipulate. If I as a security professional<br />

can manipulate the results, given an opportunity, so can any one with<br />

sufficient understanding and motivation.<br />

2. I express my strong dissent to the method because of easy tamperability<br />

and the real risks that can not be mitigated except with very prohibitive<br />

cost.<br />

3. Instead, please consider an open tambola like draw – which would be<br />

transparent and hence visible and acceptable to every Indian Army<br />

Officer, JCO, Jawan & War widow, who constitute the allottees.<br />

4. This is all the more important in view of the demonstrated lack of transparency<br />

AWHO had exhibited over many of the transactions which have<br />

been decidedly against the interests of the so called “welfare recipients”.<br />

Chandra Nath,<br />

Member, AWHO (<strong>Project</strong> EOF/DS4/98722/AR/Bangalore/2004)<br />

4

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!