[Cryptography] Characteristics of "robust, good cryptography"

Notify notify at sandpaddle.com
Tue Jan 19 13:34:29 EST 2016


Knowing that “robust” and “good” are somewhat vague, can a cryptographic algorithm, RNG, implementation, key creation/exchange methodology and hardware platform be robust and good if unknown persons who the sender did not intend to have access to the plaintext can gain that access to it through baked-in weaknesses, key sharing or related cryptographic schemes, without any interaction with the sender and intended receiver(s)?


More information about the cryptography mailing list