On 3/7/2015 12:01 PM, Dave Horsfall wrote:
On Sat, 7 Mar 2015, Kevin wrote:

No 1 vulnerability of crypto is the user
2nd passphrases
3rd overconfidence
4th trust in the producer
5th believing backdoors are No. 1
I don't agree that the user should be first on that list unless you are
talking about poor implementation.
How would you arrange them, then?  I seem to recall that Enigma was broken
largely due to sloppy user practices e.g. weak message key, re-use of
keys, repeating same message with a weaker scheme, etc.  Used properly,
Enigma would've been unbreakable at the time.

It was so easily broken because of lack of knowledge. Poor implementation is the enemy.


---
This email is free from viruses and malware because avast! Antivirus protection 
is active.
http://www.avast.com

_______________________________________________
cryptography mailing list
[email protected]
http://lists.randombit.net/mailman/listinfo/cryptography

Reply via email to