Vote early, vote often: Inside Norway's pioneering open source e-voting trials

Vote early, vote often: Inside Norway's pioneering open source e-voting trials

Summary: Norway has undertaken its second test of electronic voting. While security concerns have been raised, all the source code for the system underpinning the trial is being shared with the public.

TOPICS: Government, Security, EU

With Norway holding parliamentary elections this week, the country has taken the opportunity to hold its second e-voting pilot.

The pilot follows an earlier trial which took place during the local government elections in 2011. According to statistics released by the Ministry of Local Government and Regional Development, the ministry responsible for running elections in Norway, the e-voting participation increased significantly compared to 2011.

12 percent increase

The trial was carried out in 12 municipalities, chosen for geographical and demographical diversity, which play home to 250,000 of Norway's 3.6 million voters.

While election day itself was held on Monday, and citizens could vote in advance between 12 August and 6 September. During the advance period, Norwegians could cast their vote using either the traditional ballot or, as part of the pilot, electronically.

The count shows that in this year's election, 28 percent of all voters in the trial municipalities voted via the internet — an increase of 12 percentage points from the e-voting participation, which reached 16 percent in the 2011 pilot.

In total, 37 percent of all voters in the trial municipalities voted in advance, either with ballots or over the internet. In the country overall, 23 percent of the voters did the same.

Important security

It goes without saying that voting over the internet needs to be very secure. The system underpinning it must be locked down enough to keep voters' choice of candidate secret, to ensure that the vote is delivered and registered, to keep the vote tamperproof, to ensure each ballot is counted only once, and so on.

Consequently, the use of e-voting remains controversial in Norway, and government testing of the system has proceeded in a slow and careful fashion.

In order to push both the trustworthiness and transparency of the procedure, the source code for this year's e-voting system was put into the public domain, and anyone can now download and study the source code used from the e-voting project webpage.

The basic principle for the e-voting trial was that the voters could vote as many times they liked; only the most recent vote from each person would be counted. If an e-voter decided to go to the polling station on election day to cast their ballot instead, then that vote would be counted as their final one. The mechanism was put in place to ensure that no votes would be given under coercion.

Public/private key encryption

The electronic ballot used a public key mechanism for delivery. First, the vote itself was encrypted in such a manner it couldn't be tied to the voter's identity. Next, the vote was digitally signed with the voter's public key, to keep it tamperproof.

Around this, each voter was given their own unique set of random codes for the different candidates in the election. These codes were used as return codes from the voting system, to signifying for the voter that the vote was registered.

Once a vote was cast, the code was texted back to the voter, allowing them to compare the code sent to their phone with the printed code on their voting card — a sheet containing information such as the location of the nearest polling station — in order to ensure the voting preference that was registered was the same as the vote they had cast.

And each time an e-vote was cast, it generated a hash code — if an individual voted several times, each transaction would produce its own hash code. As a result, voters that wanted to double check that their vote was still in the system  could download the hash signature and check it was included on a public web page which showed all hash codes for every voter.

Some criticism

Even though the e-voting system with security front and centre, it still has attracted some criticism from security professionals.

The first and most discussed issue were concerns raised over the encryption used in the pilot. The encryption software on the voters' computers was thought to not have a good enough random number seed for the algorithm and, according to the security company Computas which was engaged by the government to control the system, the seed value was "very predictable".

Other security professionals also pointed out that if the voter used a smartphone or a tablet with mobile network for voting, the system could be much less secure, opening up the possibility of a hijacked web browser to communicate with the software controlling the SMSes on the phone, and then intercept the SMS receipt after casting a second vote, without the user being aware anything has gone awry.

These elements, and probably several more, are bound to be put under the microscope when the ministry begins to evaluate the performance of the e-voting trials. It's already been decided that the entire code for the voting system will be rewritten if the parliament decides to continue the project to next poll, the local government election in 2015.

Further reading

Topics: Government, Security, EU

Stig Øyvann

About Stig Øyvann

Stig spent some fifteen years working in the IT industry before upgrading to becoming a freelance technology writer. Mostly he writes for business IT magazines, but sometimes he turns his hand to consumer-oriented articles too. "A brand new digital camera is fun, but it’s a bulletproof server that makes the world go round" is Stig's point of view.

Kick off your day with ZDNet's daily email newsletter. It's the freshest tech news and opinion, served hot. Get it.


Log in or register to join the discussion
  • Remember the back door for the NSA

    Oh sorry, that's for America's electronic voting machines.
    Here in the USA of NSA remember to play along like you believe in electronic only elections and you'll hardly know you're being tracked.
  • Voting security

    What really blows me away about all this is how it's OK and acceptable to bank online, move millions of dollars electronically yet direct democracy through electronic voting is so neglected and stifled. Does this make any logical sense? Well, it's easy to see how direct democracy will bring down the house and crush the corporatocracy. If voting online gets crushed, you know who is to blame.
    • Acceptable losses

      You seem to think that money transactions seem to be secure or something. Billions and billions of dollars are lost every single year but the risk is considered acceptable because electronic transfers save more money and helps banks and businesses make more money than is lost.

      Elections and voting is not the same. My vote is far more precious than money and men and women have fought wars and died to help protect this right. Just one fraudulent vote is intolerable as it takes away the vote from another person.

      We already knew collectively that anything electronic was not private and secure but the fallout from the NSA revelations have cemented this notion. There is nothing, absolutely nothing that would stop a group like the NSA from building backdoors, decrypting, and manipulating electronic voting. Nothing.
      Rann Xeroxx
  • I think it's neat!

    You know Norway is benefiting from this big time! Security professionals are already looking and finding holes because of a publicly available source saving the government time and money in testing. troubleshooting, and developing.. So kudos to Norway for being forward looking!
    Nick Zamparello
  • evoting

    There are going to be problems and folks crying foul. That's to be expected and I hope it to be encouraged! The way they are doing it will bring the bugs and snags to the surface early. Good luck to them and I hope they come up with a good model for others to look at.
  • Balanced Approach

    Norway did a great job. I was there and met most of the players and attended the seminar.

    There are risks with Internet voting as there are with current voting practices. The trick is to balance the risks so Internet voting gives a better outcome than current practices.

    NSW is doing this by using Internet voting to support electors who would otherwise not jave been able to vote or their vote would have probably not been counted. These are disabled electors and remote electors.

    Internet voting will be avaikable in NSW again in 2015 state general election to these groups.