Regardless of how secure a communication line is and how unbreakable a cryptographic algorithm seems to be, the weak links are often the endpoints - the sender (before encryption) and the recipient (after decryption) - unless they are code talkers using a language more obscure than Navajo. (Newton Lee)

Regardless of how secure a communication line is and how unbreakable a cryptographic algorithm seems to be, the weak links are often the endpoints - the sender (before encryption) and the recipient (after decryption) - unless they are code talkers using a language more obscure than Navajo.

Newton Lee

Related topics

algorithm code communication language line obscure recipient sender using navajo links unbreakable decryption encryption

Related quotes