[148925] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] nuclear arming codes

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Sun Jan 5 00:49:50 2014

X-Original-To: cryptography@metzdowd.com
Date: Sun, 05 Jan 2014 18:39:47 +1300
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: watsonbladd@gmail.com, zenadsl6186@zen.co.uk
In-Reply-To: <52C702BB.3070500@zen.co.uk>
Cc: leichter@lrw.com, alan.braggins@gmail.com, cryptography@metzdowd.com,
	gnu@toad.com, jthorn@astro.indiana.edu
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

Peter Fairbrother <zenadsl6186@zen.co.uk> writes:

>One technique I'm told is still in use is to affix glitter in random patterns
>in clear epoxy to missile and/or warhead parts, then shine lights on it from
>variable positions and compare the return sparkle images to a known set for
>that patch. Very hard to forge.

This was developed over a number of years in the 1980s, read using an embedded
x86 system programming in Pascal (an impressive piece of image processing for
the time).  It was just getting ready for deployment when the Soviet Union
collapsed, and was replaced by a mechanism that was described to me as "magic
marker on the side of the missile".  There were some (hard-to-find) papers
published on it after the project was canned, it was basically PUFs two
decades before they were called PUFs.

Peter.

_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post