[2002] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: secret history of the development of PK crypto

daemon@ATHENA.MIT.EDU (Joe Reuter)
Wed Dec 24 13:23:47 1997

Date: Wed, 24 Dec 1997 09:54:06 -0800
From: Joe Reuter <reuter@alaska.dh.trw.com>
To: karn@qualcomm.com
Cc: smb@research.att.com, cryptography@c2.net, mab@crypto.com,
        karn@qualcomm.com
In-Reply-To: <199712240447.UAA29040@servo.qualcomm.com> (message from Phil
	Karn on Tue, 23 Dec 1997 20:47:08 -0800 (PST))
Reply-To: Joseph.Reuter@trw.com


>[description of the use of conventional crypto and precision timing
  for nuclear weapons command and control.]
>
>I'm not sure how public key cryptography is especially helpful here,
>as conventional encryption would work just fine.

Public key crypto provides an additional level of security.  With
symmetric crypto, the people who *built* the bomb in the first place 
know the firing code.  With asymmetric crypto (PK), they still know the
encryption key, but they don't know the firing key.

-- 
Joseph A. Reuter, Wizard-in-Training, speaking for myself alone
reuter@alaska.dh.trw.com  or   Joseph.Reuter@trw.com
"Olorin I was in my youth in the West that is forgotten."--J. R. R. Tolkien

home help back first fref pref prev next nref lref last post