For the widest utility, the network must be … [secure, communication] protocols should be secure even if the network is under … to invert the encryption algorithm or to subvert … expense of encryption. (No "steel doors in paper …
Google-1
Google-2
Copyright clearance needed for quotation.