Rule 6: Protocols are weaker than transforms
Many published cryptographic transforms are pretty hard to break today
Most such systems run over protocols that have weaknesses
Find the protocol weakness:
- Covert channels, Key exchanges, Man-in-the-middle, Cryptosystem negotiation
- Reflexive control by disabling cryptosystems