Introduction

What?

Encryption algorithms or implementations thereof can fail to protect confidentiality in many ways. This can be due to a failure to match the security requirements or to set requirements matching reality.

Why?

Jump Off This Cliff and think about cryptographic security requirements.

How?