Reply to post:

We need to talk about mathematical backdoors in encryption algorithms

Anonymous Coward
Anonymous Coward

OK, so let's assume I know my threat model.

Now I'm passing encrypted data but the algorithm has got a back-door (mathematical in the is case). Surly the main problem is that once the "key" leaks from government then my messages are no longer secure.

It doesn't matter what the back-door mechanism is, once it becomes known it will be exploited and the exploits will become common place... or have I missed something?

POST COMMENT House rules

Not a member of The Register? Create a new account here.

  • Enter your comment

  • Add an icon

Anonymous cowards cannot choose their icon

Biting the hand that feeds IT © 1998–2019