Re: Byte Addressability And Beyond

Liste des GroupesRevenir à c arch 
Sujet : Re: Byte Addressability And Beyond
De : SFuld (at) *nospam* alumni.cmu.edu.invalid (Stephen Fuld)
Groupes : comp.arch
Date : 04. Jun 2024, 17:26:27
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <v3nf7j$gesm$1@dont-email.me>
References : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
User-Agent : XanaNews/1.21-f3fb89f (x86; Portable ISpell)
Terje Mathisen wrote:

Stephen Fuld wrote:
Scott Lurndal wrote:
 
Michael S <already5chosen@yahoo.com> writes:
On Mon, 3 Jun 2024 08:03:53 -0000 (UTC)
Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
 
On Thu, 30 May 2024 18:31:46 +0000, MitchAlsup1 wrote:
=20
30 years ago you could say the same thing about encryption.
=20
=20
I don=E2=80=99t think newer CPUs have been optimized for
encryption. Inst=
ead,
we see newer encryption algorithms (or ways of using them)
that
work >> better on current CPUs.=20
 
I think moderate efficiency on CPU, not too low, but not high
either, is a requirement for (symmetric-key) cipher. Esp. when
the key is 128-bit or shorter.
 
Most modern CPUs have instruction set support for symmetric
ciphers such as AES, SM2/SM3 as well as message digest/hash
(SHA1, SHA256 et al).
 
High throughput encryption has been done by hardware accelerators
for decades now (e.g. bbn or ncypher HSM boxes sitting on a SCSI
bus; now such HSM are an integral part of many SoC).
 
 
Queston.  For a modern general purpose CPU, if you are including all
the logic to implement encryption instructions, is it much more to
include the control/sequencing logic to do it and not tie up the
rest of the CPU logic to do the encryption?  Furthermore, an
"inbuilt" accelerator could interface directly with the I/O
hardware of the CPU (e.g. PCI), saving the "intermediate" step of
writing the encrypted data to memory.
 
That logic already exists, in the form of a single thread/core
dedicated to the job.
 
With 30-100 cores on a single die, it becomes very cheap to dedicate
one of them to babysit such a process, compared to the cost of making
a custom chunk of VLSI to do the same. This is particularly true
because the logic needed in the babysitting process is mostly
straight line, with a very limited number of hard-to-predict branches.
 
I.e. h.264 CABAC decoding has three branches per bit decoded, at
least one of them impossible to predict or work around with clever
coding. Here it makes perfect sense to have a chunk of hw to handle
the heavy lifting. Monitoring block encryption/decryption not so much.


I may be missing something, but while your proposal addresses the first
part of my proposal, I think it doesn't adress the second.  That is,
for data coming from/going to some external source, you are still doing
"unnecessary" memory traffic, which takes memory bandwidth and
increases latency.




--
 - Stephen Fuld
(e-mail address disguised to prevent spam)

Date Sujet#  Auteur
3 Jun 24 * Re: Byte Addressability And Beyond45Lawrence D'Oliveiro
3 Jun 24 `* Re: Byte Addressability And Beyond44Michael S
3 Jun 24  +* Re: Byte Addressability And Beyond5Michael S
4 Jun 24  i`* Re: Byte Addressability And Beyond4Lawrence D'Oliveiro
4 Jun 24  i `* Re: Byte Addressability And Beyond3George Neuner
5 Jun 24  i  `* Re: Byte Addressability And Beyond2Thomas Koenig
5 Jun 24  i   `- Re: Byte Addressability And Beyond1Lawrence D'Oliveiro
3 Jun 24  +* Re: Byte Addressability And Beyond35Stephen Fuld
3 Jun 24  i+* Re: Byte Addressability And Beyond2MitchAlsup1
3 Jun 24  ii`- Re: Byte Addressability And Beyond1Stephen Fuld
3 Jun 24  i+* Re: Byte Addressability And Beyond9Stephen Fuld
3 Jun 24  ii+* Re: Byte Addressability And Beyond4Thomas Koenig
3 Jun 24  iii+* Re: Byte Addressability And Beyond2Michael S
3 Jun 24  iiii`- Re: Byte Addressability And Beyond1MitchAlsup1
3 Jun 24  iii`- Re: Byte Addressability And Beyond1Michael S
3 Jun 24  ii`* Re: Byte Addressability And Beyond4Stephen Fuld
3 Jun 24  ii `* Re: Byte Addressability And Beyond3MitchAlsup1
4 Jun 24  ii  +- Re: Byte Addressability And Beyond1Lawrence D'Oliveiro
4 Jun 24  ii  `- Re: Byte Addressability And Beyond1Stephen Fuld
4 Jun 24  i`* Re: Byte Addressability And Beyond23Terje Mathisen
4 Jun 24  i +* Re: Byte Addressability And Beyond18Stephen Fuld
5 Jun 24  i i`* Re: Byte Addressability And Beyond17Terje Mathisen
5 Jun 24  i i `* Re: Byte Addressability And Beyond16Stephen Fuld
5 Jun 24  i i  +* Re: Byte Addressability And Beyond14Michael S
5 Jun 24  i i  i+* Re: Byte Addressability And Beyond8Stephen Fuld
5 Jun 24  i i  ii`* Re: Byte Addressability And Beyond7Michael S
5 Jun 24  i i  ii +* Re: Byte Addressability And Beyond3Stefan Monnier
7 Jun 24  i i  ii i`* Re: Byte Addressability And Beyond2Lawrence D'Oliveiro
7 Jun 24  i i  ii i `- Re: Byte Addressability And Beyond1Stefan Monnier
5 Jun 24  i i  ii `* Re: Byte Addressability And Beyond3MitchAlsup1
6 Jun 24  i i  ii  `* Re: Byte Addressability And Beyond2Michael S
6 Jun 24  i i  ii   `- Re: Byte Addressability And Beyond1MitchAlsup1
5 Jun 24  i i  i`* Re: Byte Addressability And Beyond5MitchAlsup1
5 Jun 24  i i  i `* Re: Byte Addressability And Beyond4Michael S
5 Jun 24  i i  i  +* Re: Byte Addressability And Beyond2MitchAlsup1
7 Jun 24  i i  i  i`- Re: Byte Addressability And Beyond1Lawrence D'Oliveiro
5 Jun 24  i i  i  `- Re: Byte Addressability And Beyond1MitchAlsup1
5 Jun 24  i i  `- Re: Byte Addressability And Beyond1MitchAlsup1
4 Jun 24  i `* Re: Byte Addressability And Beyond4MitchAlsup1
5 Jun 24  i  `* Re: Byte Addressability And Beyond3Terje Mathisen
5 Jun 24  i   `* Re: Byte Addressability And Beyond2MitchAlsup1
6 Jun 24  i    `- Re: Byte Addressability And Beyond1Terje Mathisen
4 Jun 24  +- Re: Byte Addressability And Beyond1Lawrence D'Oliveiro
4 Jun 24  `* Re: Byte Addressability And Beyond2Terje Mathisen
4 Jun 24   `- Re: Byte Addressability And Beyond1Michael S

Haut de la page

Les messages affichés proviennent d'usenet.

NewsPortal