[2006] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: secret history of the development of PK crypto

daemon@ATHENA.MIT.EDU (Steve Bellovin)
Thu Dec 25 02:28:52 1997

To: Phil Karn <karn@qualcomm.com>
cc: bill.stewart@pobox.com, cryptography@c2.net
Date: Wed, 24 Dec 1997 18:41:34 -0500
From: Steve Bellovin <smb@research.att.com>

	 >The most intriguing answer, though, may come from Weisner's memorandum
	 >in support of NSAM-160.  It says that "this equipment ... would
	 >certainly deter unauthorized use by military forces holding the weapons
	 >during periods of high tension or military combat".  In other words,
	 >non-repudiation -- a classic use for public key crypto -- was important;
	 >if a bomb is used, they (or their heirs, or civilization's heirs...)
	 >want to know who ordered it.  Pending declassification of the rest of
	 
	 I'm not convinced. Simply order the commander to produce a copy of the
	 (conventional) decryption key after the bomb has been used. If only
	 the President and Secretary of Defense ordinarily have copies, then
	 the commander's ability to produce it means he got authorization to
	 use the weapon. Yes, in theory somebody could steal the President's
	 "football" and issue false orders -- but this could still happen even
	 if it contained private RSA keys for signing orders.
	 
	 Challenging the local commander provides accountability even if the
	 PAL consisted of nothing more than a hot-wirable electrical
	 combination lock switch. Sure, the weapon could be fired without the
	 combination, but the commander still wouldn't be able to produce the
	 combination when challenged.  Perhaps *this* is what Weisner meant by
	 "deterring" (as opposed to "preventing") "unauthorized use".
	 
	 This is not to say that public key crypto wouldn't enhance the system.
	 It would certainly make it easier to issue a limited release or a
	 series of releases of nuclear weapons, as opposed to issuing a single
	 command that starts Armageddon. But I see nothing in that memo that
	 necessarily implies they had public key crypto way back in 1962.

No one ever said they had public key crypto in 1962; even if they had
they had the math, trying to fit the necessary discrete logic into a
tactical nuke back then would have been a challenge.  A few years later
is another matter, though.  The issue is whether or not NSAM 160 *led
to* the develoment of public key cryptography.  More precisely, the
question is how -- we've already been told by two people who Knew that
it did.

My own guess is that the same thing happened at NSA that we see all too
often in the civilian sector, and even on this very mailing list.  The
whole question was handed to them, since coded communications were
clearly one way to arm some of the weapons.  A bright person took a
look at the entire set of requirements -- including accountability --
and produced a very elegant answer -- public key cryptography.  In
reality, though, an ordinary trail of accountability might work equally
well; there may not be a real need for a technical solution.

And maybe there was a strong real need for accountability.  In the
context of the times, there was some tension between the military and
the civilian leadership of control of nuclear weapons.  In the early
1950's, the AEC had physical custody of them; Curtis LeMay, commander
of SAC (Strategic Air Command), fought against this and eventually got
hold of them.  (Bear in mind that LeMay was an advocate of preventive
war -- and since he couldn't get his way on that, he did his best to
provoke the USSR into attacking.)  In 1957, a civil and continental
defense committee appointed by Eisenhower committee visited SAC; LeMay
basically ignored it until directly ordered to co-operate.  Since
Weisner was a member of that committee, he may have had a different
perspective...  (Reference for the paragraph:  Richard Rhodes' "Dark
Sun".)

But I think you're misunderstanding the scenario.  During times of
tension, the keys would be distributed to successively lower echelons
of command.  U.S. strategic doctrine has long assumed that a war would
only start after a period of increasing tension, and not as a BOOB
(bolt out of the blue); there would be ample time to distribute keys as
needed.  Weisner makes this very point, in fact.  If fighting were to
occur, the necessary officers would most likely have the keys -- but
not the authorization to use them.  A digital signature-based scheme
would provide post-war auditing. (I'm assuming, of course, that anyone
who knew what exponentiation was survived the war -- the mine shaft gap
was large enough that only politicians and the like would have been in
them, and they might not even have remembered that the pass phrase to
unlock the remaining nukes was "purity of essence".)

If we want to pursue the generic problem further (you, too, can design
a nuclear warhead command and control system in your spare time -- be
the envy of third world nations!), we can consider the complexity of
selective unlock orders (arm the ICBMs intended to produce EMP,
distribute the pin-down arm codes to the next-lower command echelon,
but withhold the city busters for now), replay protection, etc.  Also
bear in mind that Simmons was an expert on various shared control
schemes, at least one of which (Gifford, CACM April 1982) uses public
key technology.

home help back first fref pref prev next nref lref last post