To be fair...
...he wasn't proposing that security agencies have access to the content of any communications (and thus needing to bypass the encryption), but was suggesting that knowing who spoke to who and when would be sufficient for most investigations.
I did not think his analogy of the police searching someone's house was an appropriate one. A more accurate analogy would be the police getting access to footage from a CCTV camera at your house and being able to see who visited and when for as far back as they wanted. Entirely different kettle of fish and that's without touching on what hoops they would need to jump through in order to get such access....