[148906] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] nuclear arming codes

daemon@ATHENA.MIT.EDU (Peter Fairbrother)
Fri Jan 3 13:59:04 2014

X-Original-To: cryptography@metzdowd.com
Date: Fri, 03 Jan 2014 18:34:35 +0000
From: Peter Fairbrother <zenadsl6186@zen.co.uk>
To: Watson Ladd <watsonbladd@gmail.com>
In-Reply-To: <CACsn0cmyoruzHA6zyWTf=zS+H0SpRniQyonA+MhpL+=ysdcwYw@mail.gmail.com>
Cc: Jerry Leichter <leichter@lrw.com>, Alan Braggins <alan.braggins@gmail.com>,
	Cryptography <cryptography@metzdowd.com>, John Gilmore <gnu@toad.com>,
	Jonathan Thornburg <jthorn@astro.indiana.edu>
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

On 03/01/14 16:57, Watson Ladd wrote:

> For the arms control treaties they use statistical methods AFAIK.


One technique I'm told is still in use is to affix glitter in random 
patterns in clear epoxy to missile and/or warhead parts, then shine 
lights on it from variable positions and compare the return sparkle 
images to a known set for that patch. Very hard to forge.

Typically used to uniquely identify missile parts with a view to 
counting them, with a friendly guy shining the lights in situ, in some 
circumstances it can also be used with an enemy guy shining the lights 
in a remote challenge-response fashion to ensure that the patch is still 
intact - eg break the glass substrate which locks the core in its silo 
and you break the patch.


-- Peter Fairbrother


_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post