2013/10/2 Russ Nelson <nel...@crynwr.com>

> If you are proposing that something needs stronger encryption than
> ROT-26, please explain the threat model that justifies your choice of
> encryption and key distribution algorithms.
>

ROT-26 is fantastic for certain purposes. Like when encrypting for kids
that just learned how to read. For anything else than no encryption you
should have a good understanding of why you're employing the cryptography,
and why in this way.
_______________________________________________
The cryptography mailing list
cryptography@metzdowd.com
http://www.metzdowd.com/mailman/listinfo/cryptography

Reply via email to