Explore the wonderful quotes under this tag
The mantra of any good security engineer is: "Security is a not a product, but a process." It's more than designing strong cryptography into a system; it's designing the entire system such that all security measures, including cryptography, work together.
Sep 10, 2025
Cryptography products may be declared illegal, but the information will never be
Cryptography is the ultimate form of non-violent direct action.
Cryptography is typically bypassed, not penetrated.
I thought cryptography was a technique that did not require your trusting other people-that if you encrypted your files, you would have the control to make the choice as to whether you would surrender your files.
I chose to deal with the science of cryptography. Cryptography began in mathematics. Codes were developed, even from Caesar's time, based on number theory and mathematical principles. I decided to use those principles and designed a work that is encoded.
There are two kinds of cryptography in this world: cryptography that will stop your kid sister from reading your files, and cryptography that will stop major governments from reading your files.
When cryptography is outlawed, bayl bhgynjf jvyy unir cevinpl.
If you think technology can solve your security problems, then you don't understand the problems and you don't understand the technology.
I understood the importance in principle of public key cryptography but it's all moved much faster than I expected. I did not expect it to be a mainstay of advanced communications technology
A colleague once told me that the world was full of bad security systems designed by people who read Applied Cryptography
Computers had their origin in military cryptography-in a sense, every computer game represents the commandeering of a military code-breaking apparatus for purposes of human expression.
All mathematics is divided into three parts: cryptography (paid for by CIA, KGB and the like), hydrodynamics (supported by manufacturers of atomic submarines) and celestial mechanics (financed by military and other institutions dealing with missiles, such as NASA).
Cryptography [without system integrity] is like investing in an armored car to carry money between a customer living in a cardboard box and a person doing business on a park bench.
Cryptography shifts the balance of power from those with a monopoly on violence to those who comprehend mathematics and security design.
Cryptography is the essential building block of independence for organisations on the internet, just like armies are the essential building blocks of states, because otherwise one state just takes over another.
Lots of people working in cryptography have no deep concern with real application issues. They are trying to discover things clever enough to write papers about
I believed then, and continue to believe now, that the benefits to our security and freedom of widely available cryptography far, far outweigh the inevitable damage that comes from its use by criminals and terrorists. I believed, and continue to believe, that the arguments against widely available cryptography, while certainly advanced by people of good will, did not hold up against the cold light of reason and were inconsistent with the most basic American values.
Cryptography has generated number theory, algebraic geometry over finite fields, algebra, combinatorics and computers.
What affected me most profoundly was the realization that the sciences of cryptography and mathematics are very elegant, pure sciences. I found that the ends for which these pure sciences are used are less elegant.
One must acknowledge with cryptography no amount of violence will ever solve a math problem.
All collections loaded