From mboxrd@z Thu Jan 1 00:00:00 1970 X-Spam-Checker-Version: SpamAssassin 3.4.4 (2020-01-24) on polar.synack.me X-Spam-Level: X-Spam-Status: No, score=-1.9 required=5.0 tests=BAYES_00 autolearn=unavailable autolearn_force=no version=3.4.4 Path: eternal-september.org!reader01.eternal-september.org!reader02.eternal-september.org!news.eternal-september.org!mx02.eternal-september.org!.POSTED!not-for-mail From: Simon Wright Newsgroups: comp.lang.ada Subject: Re: A matter of interest. Date: Sun, 30 Nov 2014 18:12:45 +0000 Organization: A noiseless patient Spider Message-ID: References: <8f7e0b44-14a7-4e39-8910-d8f6e553b904@googlegroups.com> <2a3a193b-9ae3-421e-8017-972b926c5489@googlegroups.com> Mime-Version: 1.0 Content-Type: text/plain Injection-Info: mx02.eternal-september.org; posting-host="bd449bdcec00b09130fa10264dc9941c"; logging-data="17555"; mail-complaints-to="abuse@eternal-september.org"; posting-account="U2FsdGVkX1/C+s4hcGLSEOfPqiS90Ay7c6clkR5W/uk=" User-Agent: Gnus/5.13 (Gnus v5.13) Emacs/24.3 (darwin) Cancel-Lock: sha1:GoCXU9bpMvfPErar8Qa+rVM38mA= sha1:fZeTIOhKbIuo49Wj9rBOWtzcEy8= Xref: news.eternal-september.org comp.lang.ada:23804 Date: 2014-11-30T18:12:45+00:00 List-Id: brbarkstrom@gmail.com writes: > I do not believe that a new cryptographic algorithm can be trusted > until it has been published and attacked by competent cryptanalysts. > The classic text is > > Schneier, B., 1996: Applied Cryptography: Protocols, Algorithms, > and Source Code in C, John Wiley & Sons, New York, NY > > If the algorithm hasn't been published, the usual term would be > "security by obscurity." It doesn't work. To be fair to Austin, he has published his work-in-progress.