usenix conference policies
You are here
Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography
From a security perspective, command and control of nuclear weapons presents a challenge. The security mechanisms are supposed to be so good that they're impossible to bypass. But how do they work? Beyond that, there are reports linking these mechanisms to the early history of public key cryptography. We'll explore the documented history of both fields, and speculate on just how permissive action links—the "combination locks" on nuclear weapons—actually work.
Open Access Media
USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.
author = {Steve Bellovin},
title = {Nuclear Weapons, Permissive Action Links, and the History of Public Key Cryptography},
booktitle = {13th USENIX Security Symposium (USENIX Security 04)},
year = {2004},
address = {San Diego, CA},
url = {https://www.usenix.org/conference/13th-usenix-security-symposium/nuclear-weapons-permissive-action-links-and-history-public},
publisher = {USENIX Association},
month = aug
}
connect with us