Recently The Moral Character of Cryptographic Work was published online by Philip Rogaway. I am going to explain that the disciplinary culture of cryptography is not a scientific discipline. Cryptography itself is a science. Cryptography in many respects is the inverse of forensic science, while forensics follow a protocol, their results are no better than guessing. While cryptography's results are concrete, the culture is a serious failure. Cryptographers are well aware of the moral implications of their work... since Diffie and Hellman condemned DES's short key length ( [1]http://www.toad.com/des-stanford-meeting.html ). If according to Rogaway, "Most academic cryptographers seem to think that our field is a fun, deep, and politically neutral game—a set of puzzles involving communicating parties and notional adversaries", the fault is not with most cryptographers, but with all cryptographers. Paranoid fear surrounded the AES competition, that a cipher might have a backdoor (it turns out backdooring ciphers are more difficult than expected). Yet after the AES report turns out the full of lies ( [2]http://csrc.nist.gov/archive/aes/round2/r2report.pdf ), that additions are more vulnerable to timing attacks then... table lookups, one should do some critical self analysis. That a cryptographer calls for some sort of self-analysis long after the AES competition, the SHA-3 competition, basically after all the currently accepted ciphers have become entrenched is alarming. Each and every cryptographer seems to fail to understand what the US intelligence community actually does. They truly do, they do not seem to understand that for anyone of import, they'd develop biographies on people, if one is important enough, they might create a psychological profile. Maybe this sounds paranoid. But given that the greatest intelligence scandals involve what is believed to be true to be absolutely false and what is believed to be false to be absolutely true, paranoia is to be expected if the state takes an interest in your profession. And all cryptographers know that the state is interested in cryptography. What about the constant struggles of cryptographers getting their papers published in the seventies and eighties? Maybe only Dan Bernstein remembers that he went to court just to publish his own cipher. Naturally for Philip Rogaway, these issues came to a head after the Snowden disclosures (I'm still waiting for the next drip). For anyone to discredit themselves in the first paragraph of a forty-six page PDF is amazing. Potentially if all cryptographers somehow manage to ignore this immense logical failing is an indictment against the entire cryptographic profession. Especially given that it is commonly accepted that mathematics requires logic. Truly Rogaway is the Chomsky of Cryptography. Chomsky will deny the Cambodian holocaust and claim that oppression in the US "isn't that bad". For anyone to run out and say they are taking on the elite without knowing a damn thing about anything, I wish them a lot of luck. I might as well post a modest suggestion: cryptographers should support an FPGA integrated into the CPU or the ability to use integrated graphics for cryptography. This would remove entrenchment of standards, and allow people to pick their own ciphers. It's possible the AES-NI instructions were developed after the NSA panicked at seeing AES usage in TLS drop rapidly after the timing attacks were revealed. The AES-NI instructions are overkill, and seem to take CISC too literally. One only needs, mixcolumn+subbytes, subbyte, reverse+mixcolumn+subbytes, AESIMC and subbytes instructions of 32-bit sizes each (no need for AESENC, AESENCLAST, AESKEYGENASSIST, AESDECLAST, AESDEC, AESIMC), it would save one instruction, and the instruction will use only one operand. The way the AES-NI instructions are designed precludes usage for Rijndael with 256 bit blocks, and it seems odd that the AES-NI instructions only accept data from the XMM registers. Rigidity should be viewed with suspicion. "Therefore the clever combatant imposes his will on the enemy, but does not allow the enemy's will to be imposed on him." -Sun Tzu References 1. http://www.toad.com/des-stanford-meeting.html 2. http://csrc.nist.gov/archive/aes/round2/r2report.pdf