[146615] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: [Cryptography] NSA and cryptanalysis

daemon@ATHENA.MIT.EDU (Peter Gutmann)
Thu Sep 5 21:51:55 2013

X-Original-To: cryptography@metzdowd.com
Date: Fri, 06 Sep 2013 13:44:11 +1200
From: Peter Gutmann <pgut001@cs.auckland.ac.nz>
To: cryptography@metzdowd.com
Errors-To: cryptography-bounces+crypto.discuss=bloom-picayune.mit.edu@metzdowd.com

John Kelsey <crypto.jmk@gmail.com> writes:

>If I had to bet, I'd bet on bad rngs as the most likely source of a
>breakthrough in decrypting lots of encrypted traffic from different sources.

If I had to bet, I'd bet on anything but the crypto.  Why attack when you can
bypass [1].

Peter.

[1] From Shamir's Law [2], "crypto is bypassed, not penetrated".
[2] Well I'm going to call it a law, because it deserves to be.
[3] This is a recursive footnote [3].
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

home help back first fref pref prev next nref lref last post