Popular Deification of Transmission- and Crypto-Security
NSA Technical Journal published in October 1959 an article titled "The Borders of Cryptology." http://www.nsa.gov/public_info/_files/tech_journals/borders_cryptology.pdf A chart shows three main topics with subdivisions of each: Electronic Warfare Cryptology SIGINT http://cryptome.org/cryptology-borders.jpg Among 16 subdivisions only two are popularly deified today and whose all-too-human and vain weaknesses and vulnerabilities are hotly discussed here and elsewhere: Transmission Security Crypto-Security Knowledge of the other 14 could prove useful to compensate for the faults of the twin deities, now revealed to be not so hot conjoined. And perhaps overcome the icey ignorance of other less glorified means and methods used to profanely prop-up the pedestals.
participants (1)
-
John Young