Re: Byte Addressability And Beyond

Liste des GroupesRevenir à c arch 
Sujet : Re: Byte Addressability And Beyond
De : SFuld (at) *nospam* alumni.cmu.edu.invalid (Stephen Fuld)
Groupes : comp.arch
Date : 03. Jun 2024, 18:05:11
Autres entêtes
Organisation : A noiseless patient Spider
Message-ID : <v3kt47$3vs3s$1@dont-email.me>
References : 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17
User-Agent : XanaNews/1.21-f3fb89f (x86; Portable ISpell)
MitchAlsup1 wrote:

Stephen Fuld wrote:
 
Scott Lurndal wrote:
 
Michael S <already5chosen@yahoo.com> writes:
On Mon, 3 Jun 2024 08:03:53 -0000 (UTC)
 
 
High throughput encryption has been done by hardware accelerators
for decades now (e.g. bbn or ncypher HSM boxes sitting on a SCSI
bus; now such HSM are an integral part of many SoC).
 
 
Queston.  For a modern general purpose CPU, if you are including all
the logic to implement encryption instructions, is it much more to
include the control/sequencing logic to do it and not tie up the
rest of the CPU logic to do the encryption?  Furthermore, an
"inbuilt" accelerator could interface directly with the I/O
hardware of the CPU (e.g. PCI), saving the "intermediate" step of
writing the encrypted data to memory.
 
 
It is more of a systems issue than an ISA issue:: Consider a chip
with 100 cores, do you want all 100 cores to be doing encryption at
the same
 
time, or do you only need a certain BW of encryption rather equal to
the internet BW at hand. For the first instructions are a reasonable
starting point, for the second an I/O (or attached) processor is in
order.

I agree completely.  If all of the data to be en/decrypted is comming
from/going to an external device (network, storage device), then there
is no benefit to being able to encrypt at a faster rate than the total
I/O bandwidth.  I don't know what percentage of the data is destined
for external use, but my gut feel is that it is a lot, probably most,
possibly almost all.

If that is the case, then I think a good case can be made for putting
encryption somewhere within the I/O hardware, in order to avoid the
extra memory bandwidth and latency requirements of either instructions
or a "typical" attached processor.

--
 - Stephen Fuld
(e-mail address disguised to prevent spam)

Date Sujet#  Auteur
3 Jun 24 * Re: Byte Addressability And Beyond45Lawrence D'Oliveiro
3 Jun 24 `* Re: Byte Addressability And Beyond44Michael S
3 Jun 24  +* Re: Byte Addressability And Beyond5Michael S
4 Jun 24  i`* Re: Byte Addressability And Beyond4Lawrence D'Oliveiro
4 Jun 24  i `* Re: Byte Addressability And Beyond3George Neuner
5 Jun 24  i  `* Re: Byte Addressability And Beyond2Thomas Koenig
5 Jun 24  i   `- Re: Byte Addressability And Beyond1Lawrence D'Oliveiro
3 Jun 24  +* Re: Byte Addressability And Beyond35Stephen Fuld
3 Jun 24  i+* Re: Byte Addressability And Beyond2MitchAlsup1
3 Jun 24  ii`- Re: Byte Addressability And Beyond1Stephen Fuld
3 Jun 24  i+* Re: Byte Addressability And Beyond9Stephen Fuld
3 Jun 24  ii+* Re: Byte Addressability And Beyond4Thomas Koenig
3 Jun 24  iii+* Re: Byte Addressability And Beyond2Michael S
3 Jun 24  iiii`- Re: Byte Addressability And Beyond1MitchAlsup1
3 Jun 24  iii`- Re: Byte Addressability And Beyond1Michael S
3 Jun 24  ii`* Re: Byte Addressability And Beyond4Stephen Fuld
3 Jun 24  ii `* Re: Byte Addressability And Beyond3MitchAlsup1
4 Jun 24  ii  +- Re: Byte Addressability And Beyond1Lawrence D'Oliveiro
4 Jun 24  ii  `- Re: Byte Addressability And Beyond1Stephen Fuld
4 Jun 24  i`* Re: Byte Addressability And Beyond23Terje Mathisen
4 Jun 24  i +* Re: Byte Addressability And Beyond18Stephen Fuld
5 Jun 24  i i`* Re: Byte Addressability And Beyond17Terje Mathisen
5 Jun 24  i i `* Re: Byte Addressability And Beyond16Stephen Fuld
5 Jun 24  i i  +* Re: Byte Addressability And Beyond14Michael S
5 Jun 24  i i  i+* Re: Byte Addressability And Beyond8Stephen Fuld
5 Jun 24  i i  ii`* Re: Byte Addressability And Beyond7Michael S
5 Jun 24  i i  ii +* Re: Byte Addressability And Beyond3Stefan Monnier
7 Jun 24  i i  ii i`* Re: Byte Addressability And Beyond2Lawrence D'Oliveiro
7 Jun 24  i i  ii i `- Re: Byte Addressability And Beyond1Stefan Monnier
5 Jun 24  i i  ii `* Re: Byte Addressability And Beyond3MitchAlsup1
6 Jun 24  i i  ii  `* Re: Byte Addressability And Beyond2Michael S
6 Jun 24  i i  ii   `- Re: Byte Addressability And Beyond1MitchAlsup1
5 Jun 24  i i  i`* Re: Byte Addressability And Beyond5MitchAlsup1
5 Jun 24  i i  i `* Re: Byte Addressability And Beyond4Michael S
5 Jun 24  i i  i  +* Re: Byte Addressability And Beyond2MitchAlsup1
7 Jun 24  i i  i  i`- Re: Byte Addressability And Beyond1Lawrence D'Oliveiro
5 Jun 24  i i  i  `- Re: Byte Addressability And Beyond1MitchAlsup1
5 Jun 24  i i  `- Re: Byte Addressability And Beyond1MitchAlsup1
4 Jun 24  i `* Re: Byte Addressability And Beyond4MitchAlsup1
5 Jun 24  i  `* Re: Byte Addressability And Beyond3Terje Mathisen
5 Jun 24  i   `* Re: Byte Addressability And Beyond2MitchAlsup1
6 Jun 24  i    `- Re: Byte Addressability And Beyond1Terje Mathisen
4 Jun 24  +- Re: Byte Addressability And Beyond1Lawrence D'Oliveiro
4 Jun 24  `* Re: Byte Addressability And Beyond2Terje Mathisen
4 Jun 24   `- Re: Byte Addressability And Beyond1Michael S

Haut de la page

Les messages affichés proviennent d'usenet.

NewsPortal