On Sat, 7 Mar 2015, Kevin wrote: > > No 1 vulnerability of crypto is the user > > 2nd passphrases > > 3rd overconfidence > > 4th trust in the producer > > 5th believing backdoors are No. 1 > > I don't agree that the user should be first on that list unless you are > talking about poor implementation.
How would you arrange them, then? I seem to recall that Enigma was broken largely due to sloppy user practices e.g. weak message key, re-use of keys, repeating same message with a weaker scheme, etc. Used properly, Enigma would've been unbreakable at the time. -- Dave Horsfall DTM (VK2KFU) "Bliss is a MacBook with a FreeBSD server." http://www.horsfall.org/spam.html (and check the home page whilst you're there) _______________________________________________ cryptography mailing list cryptography@randombit.net http://lists.randombit.net/mailman/listinfo/cryptography