Computer Based Lottery for Yelahanka Project
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
<strong>Computer</strong> <strong>Based</strong> <strong>Lottery</strong> <strong>for</strong><br />
<strong>Yelahanka</strong> <strong>Project</strong><br />
Chandra Nath ∗<br />
January 31, 2013<br />
∗ nath@computer.org He is an Independent researcher engaged in research in in<strong>for</strong>ma-<br />
tion security, privacy, law & justice.<br />
1
Contents<br />
I Introduction 2<br />
II Complexity 2<br />
III Verification & Validation 3<br />
IV Conclusion 4<br />
Real Courage is found, not in the willingness to risk death, but in<br />
the willingness to stand, alone if necessary, against the ignorant<br />
and disapproving herd. Jon Roland, 1976<br />
It is an ironic truism that while technical luddites are most enthusiastic<br />
on computer based solutions, it is the security savvy that<br />
are extremely cautious.<br />
I INTRODUCTION<br />
This has reference to the <strong>for</strong>th-coming computerized lottery allocation of specific<br />
DSUs based on choices expressed by the allottees of AWHO <strong>Yelahanka</strong><br />
<strong>Project</strong>.<br />
I feel duty bound to appraise the security risks of the computerized lottery<br />
based solution to the problem of resource allocation since it seems to be<br />
inadequately appreciated by AWHO and its EDP team.<br />
II COMPLEXITY<br />
The very fact that the edp team accepted the task leads one to conclude that<br />
the team does not appreciate the complexity of the problem much less appreciate<br />
the risks in providing a trustable, secure and non-tamperable solution<br />
to the problem.<br />
If the team can define the following accurately, it would be the first step<br />
in convincing the allottees that their solution may be trusted compared to<br />
2
a simple visibly convincing tambola like drawing which can be convincingly<br />
understood by one and all among the allottees:<br />
1. A <strong>for</strong>mal definition of the problem & its constraints.<br />
2. A <strong>for</strong>mal definition of an ideal algorithm that satisfies the solution.<br />
3. A <strong>for</strong>mal proof of correctness.<br />
4. A protocol of how to ensure that the algorithm is not tampered with by<br />
interested agents including the agent who is organizing the draw with<br />
out having to trust the organisers blindly based on faith alone.<br />
5. A <strong>for</strong>mal validity, security and non-tamperability testing process.<br />
6. How and why a knowledgeable agent (NOT an ordinary naïvetè allottee<br />
who trusts the system blindly) should believe the validity of the system<br />
including algorithm correctness, testing adequacy and adequacy of<br />
privacy and security of the solution.<br />
III VERIFICATION & VALIDATION<br />
Please provide me all the documents which are “necessary and sufficient”<br />
to verify & validate the accuracy, non-tamperaility, privacy and security to<br />
create a level of confidence in the solution.<br />
In case the edp team finds difficulty in inferring what documents are<br />
“necessary and sufficient”, you (and we all in turn) might be able to conclude<br />
that their understanding of the complexity of a credible solution is severely<br />
limited and the Bangalore <strong>Yelahanka</strong> Part A allottes may be spared the home<br />
baked solution and in place, a simple tambola type physical draw based<br />
solution, the fairness of which can be appreciated even by the uninitiated<br />
in computer science, random numbers generation, algorithms, cryptography,<br />
privacy and security.<br />
I am a computer science professional with a M.S in <strong>Computer</strong> Science<br />
from University of Cali<strong>for</strong>nia from as far back as 1984 and taught M Tech<br />
and MCA courses in Advanced algorithms in Jawharlal Nehru University<br />
<strong>Computer</strong> Science Department and have a cryptography product of my own<br />
design and programming based on 256 bit AES to my credit as far back as<br />
2003 and my other security credentials can be verified from internet sources.<br />
3
IV CONCLUSION<br />
In conclusion, I sincerely urge the following:<br />
1. PLEASE DO NOT HOLD COMPUTER BASED RANDOM DRAW –<br />
since most are NOT computer security savvy and as such are not aware<br />
that any solution is easily tamperable and any security claimed is just<br />
farcical at best. For a Security professional like me it is evidently tamperabile<br />
and its security is questionable and the results in a computer<br />
based draw can be manipuated by a motivated, skillful professional<br />
and one with opportunity to manipulate. If I as a security professional<br />
can manipulate the results, given an opportunity, so can any one with<br />
sufficient understanding and motivation.<br />
2. I express my strong dissent to the method because of easy tamperability<br />
and the real risks that can not be mitigated except with very prohibitive<br />
cost.<br />
3. Instead, please consider an open tambola like draw – which would be<br />
transparent and hence visible and acceptable to every Indian Army<br />
Officer, JCO, Jawan & War widow, who constitute the allottees.<br />
4. This is all the more important in view of the demonstrated lack of transparency<br />
AWHO had exhibited over many of the transactions which have<br />
been decidedly against the interests of the so called “welfare recipients”.<br />
Chandra Nath,<br />
Member, AWHO (<strong>Project</strong> EOF/DS4/98722/AR/Bangalore/2004)<br />
4