The military works in well fenced, physically secure perimeters; its equipment is handled by well trained personnel; it may keep a method secret through either hardware or software.
The military may replace its crypto devices after every major conflict.
|
|