[Cryptography] Crypto best practices

iang iang at iang.org
Sun Mar 19 16:01:25 EDT 2017


On 10/03/2017 18:21, John Denker wrote:

> It is remarkable that they consider such weaknesses to be super-
> highly classified.  As it says in reference [1], quoting none
> other than Frank Rowlett,
>
>        "in the long run it is more important to secure one's own
>         communications than to exploit those of the enemy."
>
> Alas the NSA and CIA seem to get this wrong again and again
> and again.

To the warrior, attack is so much more fun than defence.

> [1] Thomas R. Johnson
>      "American Cryptology during the Cold War; 1945-1989"
>       Center For Cryptologic History / National Security Agency (1998)
>
> That document used to be available on the NSA web site:
>       http://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf
> but they took it down.  Have they never heard of the WayBack Machine?
>       http://web.archive.org/web/20160313120238/https://www.nsa.gov/public_info/_files/cryptologic_histories/cold_war_iii.pdf

And, to the bureaucrat, saying No is so much safer than saying Yes.

iang


More information about the cryptography mailing list