Skip to main content
USENIX
  • Conferences
  • Students
Sign in

connect with us


  •  Twitter
  •  Facebook
  •  LinkedIn
  •  Google+
  •  YouTube

twitter

Tweets by @usenix

usenix conference policies

  • Event Code of Conduct
  • Conference Network Policy
  • Statement on Environmental Responsibility Policy

You are here

Home » Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography
Tweet

connect with us

Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography

Abstract: 

From a security perspective, command and control of nuclear weapons presents a challenge. The security mechanisms are supposed to be so good that they're impossible to bypass. But how do they work? Beyond that, there are reports linking these mechanisms to the early history of public key cryptography. We'll explore the documented history of both fields and speculate on just how permissive action links—the "combination locks" on nuclear weapons—actually work.

Steven M. Bellovin, Columbia University

Open Access Media

USENIX is committed to Open Access to the research presented at our events. Papers and proceedings are freely available to everyone once the event begins. Any video, audio, and/or slides that are posted after the event are also free and open to everyone. Support USENIX and our commitment to Open Access.

BibTeX
@conference {268975,
author = {Steven M. Bellovin},
title = {Permissive Action Links, Nuclear Weapons, and the History of Public Key Cryptography },
year = {2006},
address = {Boston, MA},
publisher = {USENIX Association},
month = may,
}
Download

Presentation Video

Presentation Audio

MP3 Download OGG Download

Download Audio

Links

Slides: 
http://usenix.org/event/usenix06/tech/slides/bellovin_2006.pdf
  • Log in or    Register to post comments

© USENIX

  • Privacy Policy
  • Contact Us