[146615] in cryptography@c2.net mail archive
Re: [Cryptography] NSA and cryptanalysis
daemon@ATHENA.MIT.EDU (Peter Gutmann)
Thu Sep 5 21:51:55 2013
X-Original-To: cryptography@metzdowd.com
Date: Fri, 06 Sep 2013 13:44:11 +1200
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com
John Kelsey <crypto.jmk@gmail.com> writes:
>If I had to bet, I'd bet on bad rngs as the most likely source of a
>breakthrough in decrypting lots of encrypted traffic from different sources.
If I had to bet, I'd bet on anything but the crypto. Why attack when you can
bypass [1].
Peter.
[1] From Shamir's Law [2], "crypto is bypassed, not penetrated".
[2] Well I'm going to call it a law, because it deserves to be.
[3] This is a recursive footnote [3].
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography