Bonus reading: for the curious, The Ken Thompson Hack is probably not as far fetched as you might think, especially in modern computing where no single person really knows the entire relationship between any line of code and the actual transistors that flicker on and off.
Government recommendation for encryption was two fold:
Stimulate ecommerce
Push encryption for which they had backdoors.
_NSAKEY anyone? "Helpfully" provided S-box structures?
Bonus reading: for the curious, The Ken Thompson Hack is probably not as far fetched as you might think, especially in modern computing where no single person really knows the entire relationship between any line of code and the actual transistors that flicker on and off.