Citations:Schneier's law

English citations of Schneier's law and Schneier's Law

Noun: "(computer security) an informal law holding that anyone can create a security system they cannot personally break" edit

2011 2014 2017 2021 2022
ME « 15th c. 16th c. 17th c. 18th c. 19th c. 20th c. 21st c.
  • 2011, The Open University, My Digital Life: My Society, page 56:
    The answer is summed up in Schneier’s Law, attributed to security expert Bruce Schneier by the writer and activist Cory Doctorow: []
  • 2014, Bruce Schneir, Carry On: Sound Advice from Schneir on Security, page 34:
    This is especially true if you want to design security systems and not just implement them. Remember Schneier’s Law: “Any person can invent a security system so clever that she or he can’t think of how to break it.”
  • 2017, Jonathan Jogenfors, Breaking the Unbreakable: Exploiting Loopholes in Bell’s Theorem to Hack Quantum Cryptography, page 6:
    This is encapsulated in Schneier's law [12], which states that “anyone, from the most clueless amateur to the best cryptograher, can create an algorithm that he or she himself cannot break”.
  • 2021, Jonathan Peck, Bart Goossens, & Yvan Saeys, "Calibrated Multi-probalistic Prediction as a Defense Against Adversarial Attacks", in Artificial Intelligence and Machine Learning 31st Benelux AI Conference, BNAIC 2019, and 28th Belgian-Dutch Machine Learning Conference, BENELEARN 2019, Brussels, Belgium, November 6-8, 2019, Revised Selected Papers (eds. Bart Bogaerts et al.), page 117:
    We recall Schneier's Law [70]: Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that they themselves cannot break.
  • 2022, Andy Greenberg, Tracers in the Dark: The Global Hunt for the Crime Lords of Cryptocurrency, unnumbered page:
    RSA was one of the few fundamental encryption protocols that had not succumbed to Schneier's law in more than thirty years.
  • 2022, Diego Miranda-Saavedra, How to Think About Data Science, page 184:
    One unifying truth of computer security is described by Schneier's Law (1998) [267]: Anyone, from the most clueless amateur to the best cryptographer, can create an algorithm that he himself can't break. It's not even hard.