They *are* that smart.
When the influenced the design of DES way back when, they *both* strengthened and weakened it.
They weakened it by reducing the key length to 56 bits. It is generally believed that they did this because they could afford to build hardware that would brute-force search a 56-bit key space.
The strengthened it by making design changes, the nature of which was not obvious at the time. Many years later, cryptographers (re)discovered linear and differential cryptanalysis methods, and found that the NSA's changes to the design of DES made it essentially immune to those lines of attack. The NSA had developed those attacks, but had not published them, for obvious reasons.
In other words, the NSA wanted the strength of DES to be only 56 bits, but also not to have weaknesses reducing the effective key size signficantly below 56 bits.
When the NSA is involved in the development of any cryptosystem made available for public use, it would be foolish to assume that they haven't made sure that it is neither too insecure nor too secure.
Eric