Recovery from Nuclear Attack
ثبت نشده
چکیده
PREFACE This report on Recovery From Nuclear Attack should be of interest to all concerned with civil defense and nuclear attack. As pointed out in the report, the "impossibility" of recovery is often advanced as a reason for doing nothing to develop an effective civil defense program for the United States. However, those who have devoted years to the study of civil defense in general, and postattack problems in particular, do not agree that recovery would be impossible. There is no doubt whatsoever that if a large-scale nuclear exchange should ever occur, the result would be a massive disaster for the societies involved. The death, suffering, misery, and long-term consequences of various types would have few if any parallels in human experience—and certainly none in the history of the United States. But this is not the same as saying that recovery would be "impossible." As the report says, "in years of research, no insuperable barrier to recovery has been found." The genesis of this publication was the perceived need to respond to not infrequent inquiries on nuclear attack recovery issues. The starting point was a 1979 "Research Report on Recovery From Nuclear Attack," published by the Defense Civil Preparedness Agency—a predecessor to the Federal Emergency Management Agency. Based on research and new concerns, the document is a significantly revised and updated effort to deal with the difficult issues of the effects of the use of nuclear weapons against the United States.
منابع مشابه
One-Way IND-CNA Key Setup - a Step Towards Provably Secure Symmetric Encryption
We analyse the consequences of the specific properties of the key-setup phase in symmetric encryption schemes for their security. We find that key-setup routines satisfying IND-CNA and one-wayness allow to construct schemes which are provably secure against key-recovery attacks. We propose a specific cryptosystem for which we show that the key-setup routine ensures a significant increase in the...
متن کاملCollimator-detector response compensation in molecular SPECT reconstruction using STIR framework
Introduction:It is well-recognized that collimator-detector response (CDR) is the main image blurring factor in SPECT. In this research, we compensated the images for CDR in molecular SPECT by using STIR reconstruction framework. Methods: To assess resolution recovery capability of the STIR, a phantom containing five point sources along with a micro Derenzo p...
متن کاملSecurity Analysis of the Distance Bounding Protocol Proposed by Jannati and Falahati
In this paper, the security of a distance bounding protocol is analyzed which has been recently proposed by Jannati and Falahati (so-called JF). We prove that an adversary can recover key bits of JF protocol with probability of “1” while the complexity of attack is “2n” runs of protocol. In addition, we propose an improved protocol and prove that the improved protocol is resistant to mafia frau...
متن کاملA practical state recovery attack on the stream cipher Sablier v1
Sablier is an authenticated encryption cipher submitted to the CAESAR competition, which is composed of the encryption Sablier v1 and the authentication Au. In this work we present a state recovery attack against the encryption Sablier v1 with time complexity about 2 operations and data complexity about 24 of 16-bit keywords. Our attack is practical in the workstation. It is noticed that the up...
متن کاملSuccess probability in chi - square attacks
Knudsen and Meier applied the χ-attack to RC6. This attack is one of the most effective attacks for RC6. The χ-attack can be used for both distinguishing attacks and for key recovery attacks. Up to the present, theoretical analysis of χ-attacks, especially the relation between a distinguishing attack and a key recovery attack, has not been discussed. In this paper, we investigate the theoretica...
متن کامل