Prospect of Blockchain to Strengthen Nuclear Security€¦ · Blockchain to Strengthen Nuclear...
Transcript of Prospect of Blockchain to Strengthen Nuclear Security€¦ · Blockchain to Strengthen Nuclear...
ProspectofBlockchainto
StrengthenNuclearSecurity
LovelyUmayam&CindyVestergaard10February2020
IAEA- ICONS
Release:PNNL-SA-150314
Whatis“blockchain”?
Distributed-ledgertechnology(DLT)istheuseofreplicated,synchroniseddatasharedacross
multiple‘nodes’totrackthetransactionofassets.BlockchainisasubsetofDLT.
PUBLICvs.PRIVATEanyonecanjoin;vastamountofstakeholders
selectstakeholders;“permissioned”
Release:PNNL-SA-150314
ASimplifiedExplanation:Buildinga“trustmachine”
Input:X
ThequickbrownfoxHashingAlgorithm
HashingFunction:H(x)
IQC3JPELWM1F3HB9lJDQPXAFNJVH82FH8X4JBF02DHODS5N
Output:Y=H(X)
Understandingblockchainrequiresunderstandinghashingalgorithms
AHashingAlgorithmisamathematicalfunctionwhichtakesaninputandgeneratesa‘hashed’output
Itisextremelydifficulttoreverseengineertheinputfromtheoutput
Release:PNNL-SA-150314
BlockchainImmutability- I
P|4
PreviousHash
Hash#Transactions
Timestamp
Transactions
Block1
PreviousHash
Hash#ABCD
Timestamp
Transactions
Block2
PreviousHash
Hash#Transactions
Timestamp
Transactions
Block3
Hash#AB
Hash#A Hash#B
TransactionA TransactionB
Hash#CD
Hash#C Hash#D
TransactionC TransactionD
Ablockchainismadeupofmultipleblockslinkedtogether(hence‘blockchain’)
Eachblockisacollectionoftransactionsaswellascertainpiecesofmetadata,includingahashofthetransactionswithinitand ahashofthepreviousblock
Release:PNNL-SA-150314
BlockchainImmutability- II
P|5
PreviousHash
Hash#Transactions
Timestamp
Transactions
Block1
PreviousHash
Hash#A’BCD
Timestamp
Transactions
Block2
PreviousHash
Hash#Transactions
Timestamp
Transactions
Block3
Hash#A’B
Hash#A’ Hash#B
TransactionA’ TransactionB
Hash#CD
Hash#C Hash#D
TransactionC TransactionD
IfsomeonetriedtomodifyTransactionAtoTransactionA’,Block2willinsteadstore#A’BCD
Block2willnolongercorrespondwiththeprevioushashstoredinBlock3
Release:PNNL-SA-150314
NuclearSecurityattheTechnologicalFrontier
Whataresomepotentialpathways?
Physicalprotectioncomputersecurity
PERIMETER-CENTRIC
Self-interrogatingsystems?Proactiveapproach?
PERIMETER-LESS
UPHOLDA-CPPNMFUNDAMENDTALPRINCIPLESF- SecurityCulture;I- DefenseinDepth;J- QualityAssurance;L- Confidentiality
Release:PNNL-SA-150314
InsiderThreatMitigationDLTApplication• Monitoringactivitiesrelatedto
personnel,operations,documentsanddata
• PairingDLTwith“InternetofThings”(IoT)
• Firmwaretransparency:Validatingdataprovenance(sourcecode?),asseeninothersectorsinthecontextofvideo/imageediting
Release:PNNL-SA-150314
TransportSecurity
• Providingfidelityoftrackingspentnuclearmaterials(orothersensitiveassetsintransit)by:– Streamliningtransactions
thatcouldpotentiallyprovideinformationonalllocationsduringtransportinreal-time
– PairedwithIoT:capturingconditionsofimmediateenvironmentforadditionallayerofdata/analysisofrisk
DLTApplication
Release:PNNL-SA-150314
NuclearMaterialAccountingandControl(NMAC)
DLTApplication• Streamlineandsecureaccounting
information• Improveinformationsharingacross
appropriatestakeholdersandtransparencyamongactors
• Mitigatethreats(e.g.datamanipulation)
• Potentialapplicationstomaterialintransit
• Customizableinterfaceshowing“where/what/when”ofaproductinamomentoftime
Release:PNNL-SA-150314
KeyTakeaways
• Monitorandverifydatarelatedtopersonnel,operations,anddocuments
• Buildtrustamongskepticalpartiesandimproveinformationsharing
• Implementself-interrogatingsystemstodriveaccountability
DLThasthepotentialto…
Butquestionsremain…• Costs?• Arethereexistinglow-techapplications?• Sustainability?
Release:PNNL-SA-150314
BlockchainLunchtimeEvent
13Feb- VCDNP12:30
ThisresearchissupportedbytheU.S.DepartmentofEnergy– NationalNuclearSecurityAdministration