MIT Libraries logoDSpace@MIT

MIT
View Item 
  • DSpace@MIT Home
  • MIT Libraries
  • MIT Theses
  • Doctoral Theses
  • View Item
  • DSpace@MIT Home
  • MIT Libraries
  • MIT Theses
  • Doctoral Theses
  • View Item
JavaScript is disabled for your browser. Some features of this site may not work without it.

A framework for comparing nuclear warhead authentication protocols

Author(s)
Macdonald, Ruaridh(Ruaridh R.)
Thumbnail
Download1134982507-MIT.pdf (6.402Mb)
Other Contributors
Massachusetts Institute of Technology. Department of Nuclear Science and Engineering.
Advisor
R. Scott Kemp.
Terms of use
MIT theses are protected by copyright. They may be viewed, downloaded, or printed from this source but further reproduction or distribution in any format is prohibited without written permission. http://dspace.mit.edu/handle/1721.1/7582
Metadata
Show full item record
Abstract
Even with the end of the Cold War, nuclear arms control continues to be a cornerstone of strategic stability and international non-proliferation efforts. New treaties are necessary to build upon, or at least maintain, the status-quo, and will rely upon verification technologies and protocols to ensure all sides are dismantling their warheads as promised. The nuclear weapon states refuse to participate in any process which might reveal the design of their warheads to an adversary or would-be proliferator. This makes warhead authentication, the critical verification step where the object to be dismantled is confirmed to be an authentic warhead, especially challenging. Despite several decades of research, there is no agreed means of describing or assessing warhead authentication protocols. This has hindered protocol development, and made it more difficult for the policy and technical communities to communicate what is important and feasible.
 
This thesis presents a framework for describing warhead authentication protocols and quantifying their performance. The framework draws on methods used to assess digital authentication protocols, as well as information theoretic analysis of privacy. A model is developed for describing authentication protocols; showing how authentication questions, physical properties, and measurable data relate to one another. This allows the objectives and assumptions of a protocol to be made explicit, helping to ensure that protocols are compared fairly. It was found that the protocols in the literature have made use of very different assumptions, and that has influenced their choices of measurement technology and concepts of operation. Having established how to describe protocols, the thesis investigates how best to quantify the completeness (type I error rate), soundness (type II error rate), and information privacy of a protocol.
 
While the absolute soundness cannot be calculated without knowledge of all possible hoaxes, a conditional soundness can be estimated using a minimax approach. A new measure of information privacy is presented, based on a change in the KL divergence between an inspector's beliefs and the actual warhead design, when the inspector starts from an incorrect prior.
 
Description
This electronic version was submitted by the student author. The certified thesis is available in the Institute Archives and Special Collections.
 
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Nuclear Science and Engineering, 2019
 
Cataloged from student-submitted PDF version of thesis.
 
Includes bibliographical references (pages 173-179).
 
Date issued
2019
URI
https://hdl.handle.net/1721.1/123368
Department
Massachusetts Institute of Technology. Department of Nuclear Science and Engineering
Publisher
Massachusetts Institute of Technology
Keywords
Nuclear Science and Engineering.

Collections
  • Doctoral Theses

Browse

All of DSpaceCommunities & CollectionsBy Issue DateAuthorsTitlesSubjectsThis CollectionBy Issue DateAuthorsTitlesSubjects

My Account

Login

Statistics

OA StatisticsStatistics by CountryStatistics by Department
MIT Libraries
PrivacyPermissionsAccessibilityContact us
MIT
Content created by the MIT Libraries, CC BY-NC unless otherwise noted. Notify us about copyright concerns.