* Russ Allbery <r...@debian.org> [2022-03-05 12:39]:
I'm not sure that I see this for DPL elections because we publish both the
list of votes and the list of voters.  If those two lists aren't the same
length, that's fairly trivially detectable.
You're right, I missed that when I looked at the election
results. In that case, the forger needs to map some voters who voted
identically to the same HMAC_SHA256_HEX value, which means you need
to find collisions on the HMAC keys such that

  H(uid1, K1) == H(uid2, K2)

I don't know how resistant HMAC-SHA256 is to this type of "chosen
key" attack.

Cheers
Timo


--
⢀⣴⠾⠻⢶⣦⠀   ╭────────────────────────────────────────────────────╮
⣾⠁⢠⠒⠀⣿⡁   │ Timo Röhling                                       │
⢿⡄⠘⠷⠚⠋⠀   │ 9B03 EBB9 8300 DF97 C2B1  23BF CC8C 6BDD 1403 F4CA │
⠈⠳⣄⠀⠀⠀⠀   ╰────────────────────────────────────────────────────╯

Attachment: signature.asc
Description: PGP signature

Reply via email to