Uncrackable encryption could secure more than weapons
- By Mark Rockwell
- Dec 08, 2014
An encryption concept called Intrinsic Use Control uses a nuclear weapon’s fluctuating radiation fields to create use control numbers, and would be able to protect the weapon and its components from unauthorized use. Photo by Julie Russell and Bob Sickles/LLNL
A novel approach to encrypting nuclear weapons could promise unprecedented security for other applications in need of encoded protection, such as communications and the IT supply chain.
The concept harnesses the native signature of a nuclear weapon's fluctuating radiation field to develop a complex identification code for each component. The coding can lock down those components with an almost unknowable key if they're tampered with, essentially allowing the weapon to protect itself from outside meddling.
Because the code is randomly generated by its unique nuclear source, it's not known by any person, and therefore, the possibility that it could be replicated is substantially reduced, said Mark Hart, a scientist and engineer at Lawrence Livermore National Laboratory.
Hart has been working on the Intrinsic Use Control concept since 2002. It won the National Nuclear Security Administration's 2015 Surety Transformation Initiative Award for its innovation and ironclad security.
"Using the random process of nuclear radioactive decay is the gold standard of random number generators," Hart said. "You'd have a better chance of winning both Mega Millions and Powerball on the same day than getting control of IUC-protected components."
The coding is imprinted on a nuclear weapon's components during assembly, with the unique IDs known only to the weapon. Any anomaly in the verification process, spurred by attempted removal or replacement of a protected component, shuts down all the components on the weapon, rendering it unusable, Hart said.
Although it might sound as though the technique has a very specific use, Hart told FCW that other agencies and industry could harness it to protect other IT hardware and communications.
All radiation sources decay -- from highly enriched uranium to everyday background radiation -- so IUC coding could easily be generated outside the nuclear weapons realm. For instance, the approach could be used in the manufacturing process of IT equipment destined for secure uses to prevent tampering and better secure the supply chain, Hart said.
The coding could eliminate insider threats by preventing people from adding counterfeit components or tampering with the equipment, he added.
Additionally, gear in point-to-point communications links could be loaded with a unique radiologically generated encryption key, rather than relying on a manufacturer's less-secure coding.
Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.
Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.
Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.
Click here for previous articles by Rockwell.
Contact him at firstname.lastname@example.org or follow him on Twitter at @MRockwell4.