William Rowden writes:
> In the tempting-but-wrong category, one could include samples of the
> insecure systems that result when programmers with no cryptanalysis
> background create their own cryptographic algorithms.

Yes, and let us hope that Michael Paul Johnson resists the temptation to
plug his own home-grown ciphers, Sapphire and Diamond.  Hopefully he'll
realize that including his own ciphers in the book will ruin what little
credibility he has as an author.

Reply via email to