Documentos de Académico
Documentos de Profesional
Documentos de Cultura
“Bypassing a PAL should be, as one weapons designer graphically put it,
about as complex as performing a tonsillectomy while entering the patient
from the wrong end.”
• How do they work? What are the design principles? Supposedly, they
cannot be bypassed.
• Is there a lesson more mundane sorts of security mechamisms
should emulate?
• The history is interesting, and not fully documented. The original
order to deploy PALs (NSAM-160, June 1962) is claimed to be the
basis for NSA’s invention of public key cryptography in the
mid-1960’s. What is the relationship?
• I really hope they work as advertised. . .
Disclaimer
MLF Lullaby
—Tom Lehrer
Who’s Next?
—Tom Lehrer
Many Risks
Enter PALs
I used to worry about General Power. I used to worry that General Power
was not stable. I used to worry about the fact that he had control over so
many weapons and weapon systems and could, under certain conditions,
launch the force. Back in the days before we had real positive control [i.e.,
PAL locks], SAC had the power to do a lot of things, and it was in his
hands, and he knew it.
More Research
• Lots of library work
• (My small, suburban library was able to get all sorts of unusual things
via inter-library loan.)
• Not all that much information online
• Technical publications from Sandia Labs
• Freedom of Information Act requests
☞They arrive “redacted”
• Nothing conclusive — but I learned a lot about nuclear weapons
command and control
• I needed to understand how bombs worked, in order to understand
how they could be protected
Steven M. Bellovin April 20, 2006 17
PAL
Tamper
11111111
00000000
00000000
11111111
Detonator 00000000
11111111
00000000
11111111 Explosive Shell
00000000
11111111
Fissile material
Initator
The deuterium/tritium pump, the initiator (the initial neutron source), and
the detonators are all controlled by the sequencer. The first two require
high voltage sources. Timing is critical to yield.
Steven M. Bellovin April 20, 2006 18
PAL
Safety Features
Unique Signal
Generator
Signal
Processor
Tamper−proof membrane
Arming and Fuzing
Environmental
Sensors
PALs
• Originally electromechanical. (Some weapons used combination
locks.)
• Newest model is microprocessor-based. There may still be a
mechanical component.
• Recent PAL codes are 6 or 12 digits.
• The weapon will permanently disable itself if too many wrong codes
are entered.
• PALs respond to a variety of codes – several different arming codes
for different groups of weapons, disarm, test, rekey, etc.
• It was possible, though difficult, to bypass early PALs. (Some even
used false markings to deceive folks who didn’t have the manual.) It
does not appear to be possible to bypass the newest “CAT F” PAL.
Steven M. Bellovin April 20, 2006 22
PAL
Can you encrypt the detonation sequence timing information, and fire
different explosives at different times?
• Modern high-efficiency bombs use just two-point detonation — not a lot of variables
to play with.
• Control of the D/T reservoir and the initiator is feasible – but the former affects only
the yield, and for the latter, there is still a non-negligible probability of detonation in
the absence of external neutron injection.
Steven M. Bellovin April 20, 2006 24
PAL
Hypothesized Design 1
• PALs use several switches to control the high voltage path to the
detonators.
• The original designs used rotors similar to those on World War
II-vintage encryption machines. The technology was simple, reliable,
and well-understood in 1962.
• Newer ones use a a microprocessor to control the switches. This may
work by providing a encryption key for the environmental sensors; the
signal is decrypted by the strong links.
• The tamper-resistant skin prevents bypass attempts.
Hypothesized Design 2
Security Criteria
• Some evidence that they use the same two-input principle as UQS
units
• Similar evidence of the lock-up principle
• Well studied properties
• Reuse some of the idea?
Deployment of PALs
Conclusions
• I still don’t know anything definite on how PALs work (but I did learn a
lot of other things, many of them directly relevant to my day job)
• It’s unclear if the issue really did lead to public key cryptography
• But — the British invented public key encryption; did the NSA invent
digital signatures?
• I haven’t yet found anything about setting C.R.M.-114 discriminators
to ”FGD 135”, let alone ”OPE”. . .
References