Exactly, which is why I trust open standards and Bruce Schneier. There are 4 possible ways to implement the standard. One may (possibly) have a back door. The standard even describes the way to get around that possibility if you choose that method and you are worried. And it was all picked up and demonstrated before it was even included in normal software (MS later included that algorithm in Vista).
As Schneier says: cryptographers are a very suspicious bunch. Judah On Thu, Sep 27, 2012 at 10:29 AM, Cameron Childress <[email protected]> wrote: > > Says you: > http://www.schneier.com/essay-198.html > > On Thu, Sep 6, 2012 at 2:01 PM, Judah McAuley <[email protected]> wrote: > >> There are no secret back doors to open source encryption with public >> algorithms. The only way to defeat it is with brute force attacks >> and/or social engineering. The NSA and related group have a heck of a >> lot of computing power at their disposal but if the people doing the >> encryption know what they are doing (which is always a supposition >> open to criticism) and applied, say, multiple rounds of encryption >> with AES using a strong key and good salting then, yes, it would be a >> very long brute force attack. Far easier to try and steal the keys. > > > ... > > > ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~| Order the Adobe Coldfusion Anthology now! http://www.amazon.com/Adobe-Coldfusion-Anthology/dp/1430272155/?tag=houseoffusion Archive: http://www.houseoffusion.com/groups/cf-community/message.cfm/messageid:355626 Subscription: http://www.houseoffusion.com/groups/cf-community/subscribe.cfm Unsubscribe: http://www.houseoffusion.com/groups/cf-community/unsubscribe.cfm
