Schneier's Law

Schneier's Law

The term "Schneier's Law" was coined by Cory Doctorow in his speech about Digital Rights Management for Microsoft Research.cite web |author=Cory Doctorow |date=2004-06-17 |title=Microsoft Research DRM talk |url=http://www.dashes.com/anil/stuff/doctorow-drm-ms.html |accessdate=2006-12-31 ] The law is phrased as:

He attributes this to Bruce Schneier, presumably making reference to his book Applied Cryptography, although the principle predates its publication. In The Codebreakers, David Kahn states:

Another theory is that Cory was referring to the symmetric ciphers Blowfish and Twofish developed by Schneier and coworkers and then unsuccessfully cryptanalyzed by them.

See also

* Bruce Schneier
* Security through obscurity
* Full disclosure

References

*


Wikimedia Foundation. 2010.

Игры ⚽ Поможем решить контрольную работу

Look at other dictionaries:

  • Bruce Schneier — infobox scientist name = Bruce Schneier birth date = Birth date and age|1963|1|15|df=y residence = citizenship = field = Computer science work institutions = Counterpane Internet Security Bell Labs United States Department of Defense BT Group… …   Wikipedia

  • List of basic tort law topics — Tort law refers to any given body of law that creates and provides remedy for civil wrongs that do not arise from contractual duties. A person who is legally injured may be able to use tort law to recover damages from someone who is legally… …   Wikipedia

  • Outline of tort law — See also: Index of tort articles The following outline is provided as an overview of and introduction to tort law: Tort law – defines what a legal injury is and, therefore, whether a person may be held liable for an injury they have caused. Legal …   Wikipedia

  • List of eponymous laws — This list of eponymous laws provides links to articles on laws, adages, and other succinct observations or predictions named after a person. In some cases the person named has coined the law – such as Parkinson s law. In others, the work or… …   Wikipedia

  • Phishing — In the field of computer security, phishing is the criminally fraudulent process of attempting to acquire sensitive information such as usernames, passwords and credit card details, by masquerading as a trustworthy entity in an electronic… …   Wikipedia

  • Cryptography — Secret code redirects here. For the Aya Kamiki album, see Secret Code. Symmetric key cryptography, where the same key is used both for encryption and decryption …   Wikipedia

  • Electronic voting — Election technology Certification of voting machines Independent Testing Authority (ITA) NVLAP VVSG End to end auditable voting systems Help America Vote Act Independent verific …   Wikipedia

  • SHA hash functions — The SHA hash functions are a set of cryptographic hash functions designed by the National Security Agency (NSA) and published by the NIST as a U.S. Federal Information Processing Standard. SHA stands for Secure Hash Algorithm. The five algorithms …   Wikipedia

  • Cypherpunk — Not to be confused with Cyberpunk. A cypherpunk is an activist advocating widespread use of strong cryptography as a route to social and political change. Originally communicating through the Cypherpunks electronic mailing list, informal groups… …   Wikipedia

  • Electoral fraud — Articleissues|article=y cleanup=January 2008 wikify=January 2008Electoral fraud is illegal interference with the process of an election. Acts of fraud tend to involve affecting vote counts to bring about a desired election outcome, whether by… …   Wikipedia

Share the article and excerpts

Direct link
Do a right-click on the link above
and select “Copy Link”