He does not need to be. This is information that most people who are serious about researching this sort of thing or who are professionals in the industry take for granted because it is a known quantity.
The chinese are not the cylons, and this is not battlestar galactica.
But you both have no clue what you're talking about. I work in IT security and deal with encryption protocols and methodology all the time. Taking this sort of thing as 'granted because it is a known quantity' would get you laughed at by IT professionals. It is possibly the most ignorant thing I have heard when it comes to encryption systems.
Encryption can be broken, you don't always need a supercomputer. All you need is to study the source code for weaknesses. As encryption protocols are written by humans there are always weaknesses (see the recent Juniper issues for example, Heartbleed and numbers other encryption system weaknesses over the last 3 years).
Encryption between things (as opposed to personal devices) often uses fixed keys or fixed authentication/handshake mechanisms. If you know how that mechanism works you have another point of attack (look at the recent issues Fortinet had with their management SSH access).
Guess what the chinese have.
Look at the recent example of Apple and the FBI... look how quickly hackers were able to bypass the security system to provide access to the FBI.
And before you start on rah rah Lockhead is a government organization rah rah higher security/encryption - I would remind you that both Lockheed and RSA (whom Lockheed uses for security) got hacked.