‘Gold standard’ for random number generation: radioactive decay

‘Gold standard’ for random number generation: radioactive decay

The technology used to control access to nuclear weapons could secure other applications that use encoded protection, such as communications and the IT supply chain.

Intrinsic use control (IUC) uses a nuclear weapon’s fluctuating radiation fields to create complex, unique use control numbers, which protect the weapon and its components from unauthorized use.

The coding can lock down system components with an almost unknowable key if they're tampered with, essentially allowing the weapon to protect itself from outside meddling.

Because the code is randomly generated by its unique nuclear source, it's not known by any person, and therefore the possibility that it could be replicated is substantially reduced, said Mark Hart, a scientist and engineer at Lawrence Livermore National Laboratory.

"Using the random process of nuclear radioactive decay is the gold standard of random number generators," Hart said. "You'd have a better chance of winning both Mega Millions and Powerball on the same day than getting control of IUC-protected components."

The coding is imprinted on a nuclear weapon's components during assembly, with the unique IDs known only to the weapon. Any anomaly in the verification process, spurred by attempted removal or replacement of a protected component, shuts down all the components on the weapon, rendering it unusable, Hart said.

Although it might sound as though the technique has a very specific use, other agencies and industry could harness it to protect other IT hardware and communications, Hart said in an interview with FCW, GCN’s sister site.

Using a unique radiologically generated encryption key in the manufacturing process of IT equipment could prevent tampering and better secure the supply chain, Hart said.

The coding could even eliminate insider threats by preventing people from adding counterfeit components or tampering with the equipment, he added.

This article first appeared on FCW, a sister site to GCN.

About the Author

Mark Rockwell is a senior staff writer at FCW, whose beat focuses on acquisition, the Department of Homeland Security and the Department of Energy.

Before joining FCW, Rockwell was Washington correspondent for Government Security News, where he covered all aspects of homeland security from IT to detection dogs and border security. Over the last 25 years in Washington as a reporter, editor and correspondent, he has covered an increasingly wide array of high-tech issues for publications like Communications Week, Internet Week, Fiber Optics News, tele.com magazine and Wireless Week.

Rockwell received a Jesse H. Neal Award for his work covering telecommunications issues, and is a graduate of James Madison University.

Click here for previous articles by Rockwell. Contact him at mrockwell@fcw.com or follow him on Twitter at @MRockwell4.


inside gcn

  • analytics (Wright Studio/Shutterstock.com)

    3 data strategies to help crackdown on internal corruption

Reader Comments

Please post your comments here. Comments are moderated, so they may not appear immediately after submitting. We will not post comments that we consider abusive or off-topic.

Please type the letters/numbers you see above

More from 1105 Public Sector Media Group