[1999] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: secret history of the development of PK crypto

daemon@ATHENA.MIT.EDU (Steve Bellovin)
Wed Dec 24 12:19:49 1997

To: Phil Karn <karn@qualcomm.com>
cc: cryptography@c2.net, mab@crypto.com
Date: Wed, 24 Dec 1997 08:42:54 -0500
From: Steve Bellovin <smb@research.att.com>

	Precise timing -- that's the key to my idea for a highly effective
	PAL.  First, design the weapon to make the firing sequence as
	inherently complex and critical as possible. Vary the chemical
	composition and detonation velocities of the various pieces of high
	explosive so they have to be detonated non-simultaneously. Then store
	all of the required timing data in encrypted form in the weapon's
	memory. Better yet, encrypt *everything* (program and data) except for
	a small bootstrap that accepts an external key and decrypts everything
	for firing. Include this decryption key in the "nuclear weapons
	release" message from the "National Command Authority" (I've always
	loved that military terminology!)

A number of us, myself included, have come up with the same design
independently.  I would also use different explosives in different
bombs, so that each had a different timing sequence.

	 I'm not sure how public key cryptography is especially helpful here,
	 as conventional encryption would work just fine.

I can see several reasons.  The most compelling, I think, is what Bill
Stewart pointed out -- it provides more protection against reverse-
engineering.  There are also likely advantages in terms of key management,
as with any other use of public key crypto.

The most intriguing answer, though, may come from Weisner's memorandum
in support of NSAM-160.  It says that "this equipment ... would
certainly deter unauthorized use by military forces holding the weapons
during periods of high tension or military combat".  In other words,
non-repudiation -- a classic use for public key crypto -- was important;
if a bomb is used, they (or their heirs, or civilization's heirs...)
want to know who ordered it.  Pending declassification of the rest of
the memo, I suspect that this is the crucial seed that led to the
invention of public key cryptography at NSA.  (I should note that
the quoted sentence is right in between the two largest "sanitized"
section of the memorandum...)

home help back first fref pref prev next nref lref last post