“Regardless of how secure a communication line is and how unbreakable a cryptographic algorithm seems to be, the weak links are often the endpoints - the sender (before encryption) and the recipient (after decryption) - unless they are code talkers using a language more obscure than Navajo.”

—  Newton Lee

Counterterrorism and Cybersecurity: Total Information Awareness (2nd Edition), 2015

Adopted from Wikiquote. Last update June 3, 2021. History

Help us to complete the source, original and additional information

Do you have more details about the quote "Regardless of how secure a communication line is and how unbreakable a cryptographic algorithm seems to be, the weak li…" by Newton Lee?
Newton Lee photo
Newton Lee 236
American computer scientist

Related quotes

Elizabeth Bibesco photo

“Life more often teaches us how to perfect our weaknesses than how to develop our strengths.”

Elizabeth Bibesco (1897–1945) writer, actress; Romanian princess

Haven (1951)

Fernando J. Corbató photo

“Regardless of whether one is dealing with assembly language or compiler language, the number of debugged lines of source code per day is about the same!”

Fernando J. Corbató (1926–2019) American computer scientist

"PL/I as a Tool for System Programming", Datamation, 15 (5), 6 May 1969, pp. 68–76. This has been paraphrased variously by others as Corbató's Law:
Productivity and reliability depend on the length of a program’s text, independent of language level used.
Albert Endres, H. Dieter Rombach, A Handbook of Software and Systems Engineering: Empirical Observations, Laws and Theories (2003), ISBN 0321154207, p. 72
The number of lines of code a programmer can write in a fixed period of time is the same independent of the language used.
[citation needed]

Eric Schmidt photo

“We have always been the leader in security and in encryption. Our systems are far more secure and encrypted than anyone else, including Apple. They're catching up, which is great.”

Eric Schmidt (1955) software engineer, businessman

Eric Schmidt says Google 'far more secure' than Apple, denies allegations of harvesting data http://appleinsider.com/articles/14/10/02/eric-schmidt-says-google-far-more-secure-than-apple-denies-allegations-of-harvesting-data in AppleInsider (2 October 2014).

Bruce Schneier photo

“Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break.”

Bruce Schneier (1963) American computer scientist

Memo to the Amateur Cipher Designer, Schneier, Bruce, 1998-10-15, Cryptogram newsletter http://www.schneier.com/crypto-gram-9810.html#cipherdesign, (aka Schneier's Law)
Cryptography

Doron Zeilberger photo

“Mathematics my foot! Algorithms are mathematics too, and often more interesting and definitely more useful.”

Doron Zeilberger (1950) Israeli mathematician

The Narrow-Minded and Ignorant Referee's Report [and Zeilberger's Response] of Zeilberger's Paper "Automaric CounTilings" that was rejected by Helene Barcelo and the Members of the Advisory Board [that includes(!) Enumeration Expert Mireille Bousquet-Melou] of the Journal of Combinatorial Theory-Series A. http://www.math.rutgers.edu/~zeilberg/RefTipesh.html

William Makepeace Thackeray photo
Richard K. Morgan photo
Fernando J. Corbató photo

“The use of the high level language made each programmer a factor of 5 to 10 more productive in a coding sense and more concerned with the semantics than the syntax of modules.”

Fernando J. Corbató (1926–2019) American computer scientist

"A Managerial View of the Multics System Development" (1978)

Related topics