Implementation*
Even if the cryptosystem is fantastically good the implementation has almost always been subvertable
- The key distribution problem
- The key maintenance problem
- The cryptographic protocol problem
- The key scheduling problem
- The key generation/selection problem