2013/10/2 Russ Nelson <nel...@crynwr.com> > If you are proposing that something needs stronger encryption than > ROT-26, please explain the threat model that justifies your choice of > encryption and key distribution algorithms. >
ROT-26 is fantastic for certain purposes. Like when encrypting for kids that just learned how to read. For anything else than no encryption you should have a good understanding of why you're employing the cryptography, and why in this way.
_______________________________________________ The cryptography mailing list cryptography@metzdowd.com http://www.metzdowd.com/mailman/listinfo/cryptography