Nuclear weapons write their own security codes

Intrinsic Use Control uses the weapon’s fluctuating radiation fields to create use control...
Intrinsic Use Control uses the weapon’s fluctuating radiation fields to create use control numbers, known only to the weapon (Photo: Julie Russell and Bob Sickles/LLNL)
Nuclear weapons are a paradox. No one in their right mind wants to use one, but if they're to act as a deterrent, they need to be accessible. The trick is to make sure that access is only available to those with the proper authority. To prevent a real life General Jack D Ripper from starting World War III, Livermore National Laboratory’s (LLNL) Defense Technologies Division is developing a system that uses a nuclear weapon's own radiation to protect itself from tampering.

Nuclear weapons are extremely complex. In part, this is due to the nature of the weapon, but much of the complexity is because of the high degree of redundancy in the arming and firing mechanisms, plus the security controls. In other words, all the machinery needed to make sure that the bomb doesn't go off before its supposed to, and make absolutely sure that it does go off when it should.

This is what's known as the always/never dilemma. The tricky bit is to hit the right spot in between what seems like mutually exclusive ideas, yet leaves the baddies and loonies out of the loop.
One way is to rely on the people in charge of the nuclear weapons. For example, up until the late 1990s, the Royal Navy and RAF relied on simple keys and the integrity of their officers and the professionalism of their crews to maintain control. The idea was to put the right people in charge of a system that could only be compromised by a massive conspiracy, such as a whole submarine crew agreeing to launch the missiles.

On the other hand, the US military uses Permissive Action Links (PAL). Instead of relying on fences, guards, bunkers, steel doors, or even arming locks, the security is built into the weapon itself. In the case of PAL, a special code is needed to arm the bomb. When the correct code is entered, it doesn't just unlock the mechanism, it reconfigures it, so it can operate. Without the code, the weapon not only won't fire, but it can't.

The system works, but it has its limitations, and it is possible to work around the PAL codes. That's where Intrinsic Use Control (IUC) comes in.

Intrinsic Use Control (IUC) was developed by Mark Hart, a scientist and engineer at the LLNL Defense Technologies Division. The idea is to go one step down from PAL. Instead of protecting the bomb, IUC passively protects the components using existing technology. More than that, the weapon is designed to protect itself so thoroughly that even the engineers who created the bomb can't compromise it, yet the device remains ready for immediate use by the US President.

IUC uses the radiation of the bomb to protect it from tampering. According to Hart, the low level radiation emitted by a nuclear weapon isn't constant, but fluctuates. When a weapon using IUC is assembled, various key components are designed to digitally communicate with one another. As they do so, the radiation is used to generate a very long random number. Unlike random number generators in computers, this number isn't based on an algorithm, so it can't be deduced or duplicated.

"Using the random process of nuclear radioactive decay is the gold standard of random number generators," Hart says. "You’d have a better chance of winning both Mega Millions and Powerball on the same day than getting control of IUC-protected components."

What this means is that the weapon not only can't be armed by unauthorized persons, it can't be tampered with. Any attempt to remove or replace a key component alerts the other components, and the bomb shuts down.

Hart says that the odds of gaining control of one component are less than 10-18. Taking over an entire bomb is a less than 10-72 chance.

"An IUC-class weapon would function reliably as intended, when intended, exclusively under authorization by the National Command Authority," Hart explains. "The component use control that IUC provides is sufficiently robust to defeat any unauthorized attempt to make these components function, even by the people who designed and built the arming, firing and initiation components.”

Hart’s work was awarded the 2015 Surety Transformation Initiative (STI) Award from the National Nuclear Security Administration’s (NNSA) Enhanced Surety Program.
In the video below, Mark Hart discusses the IUC system.

 
Source
 

Comments