1998-06-30 - NSA and crypto algorithms

Header Data

From: bill payne <billp@nmol.com>
To: jy@jya.com
Message Hash: 952d75953f34e9fe39a7fca5075e2125748a1b02875414a9af2b5c41505d9e87
Message ID: <359934DE.1B4@nmol.com>
Reply To: N/A
UTC Datetime: 1998-06-30 18:59:47 UTC
Raw Date: Tue, 30 Jun 1998 11:59:47 -0700 (PDT)

Raw message

From: bill payne <billp@nmol.com>
Date: Tue, 30 Jun 1998 11:59:47 -0700 (PDT)
To: jy@jya.com
Subject: NSA and crypto algorithms
Message-ID: <359934DE.1B4@nmol.com>
MIME-Version: 1.0
Content-Type: text/plain

It is EASY to make mistakes when designing crypto algorithms.

SECRECY works against NSA in that their work doesn't get 
proper evaluation by HOSTILE referees.  Like

NSA does have good experiences at fielding crypto devices.

My suprise at gaining access to NSA crypto algorithms was how
simple they were.