[cryptography] Crypto Vulns
dave at horsfall.org
Sat Mar 7 22:17:11 EST 2015
On Sat, 7 Mar 2015, Kevin wrote:
> > How would you arrange them, then? I seem to recall that Enigma was
> > broken largely due to sloppy user practices e.g. weak message key,
> > re-use of keys, repeating same message with a weaker scheme, etc.
> > Used properly, Enigma would've been unbreakable at the time.
> It was so easily broken because of lack of knowledge. Poor
> implementation is the enemy.
Yeah, I concede the point.
Dave Horsfall DTM (VK2KFU) "Bliss is a MacBook with a FreeBSD server."
http://www.horsfall.org/spam.html (and check the home page whilst you're there)
More information about the cryptography