|
I believe that in most cases it's more a matter of shops accepting risks
associated with bad practices vs. the cost of best practices. It's more of
a question of resource constraints vs. risks.
But Schneier himself would not do such a
thing: he would publish his algorithm and have the entire security
community work on it, crackers and all. I'm not speculating here, he
has actually done exactly that with Blowfish, Twofish, Threefish, and more.
I'd suggest that his motive might have less to do with strong encryption,
and more to do with wanting his algorithms to be widely used.
Based on conversations with my dad, I believe that the protocols,
practices, and algorithms used by the U.S. military are not vetted "in the
open".
As an Amazon Associate we earn from qualifying purchases.
This mailing list archive is Copyright 1997-2024 by midrange.com and David Gibbs as a compilation work. Use of the archive is restricted to research of a business or technical nature. Any other uses are prohibited. Full details are available on our policy page. If you have questions about this, please contact [javascript protected email address].
Operating expenses for this site are earned using the Amazon Associate program and Google Adsense.