Warning: mysqli::__construct(): (HY000/1203): User howardkn already has more than 'max_user_connections' active connections in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\includes\artfuncs.php on line 21
Failed to connect to MySQL: (1203) User howardkn already has more than 'max_user_connections' active connections
Warning: mysqli::query(): Couldn't fetch mysqli in D:\Inetpub\vhosts\howardknight.net\al.howardknight.net\index.php on line 66
Article <20240604121133.0000499b@yahoo.com>
Deutsch   English   Français   Italiano  
<20240604121133.0000499b@yahoo.com>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!news.mixmin.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: Michael S <already5chosen@yahoo.com>
Newsgroups: comp.arch
Subject: Re: Byte Addressability And Beyond
Date: Tue, 4 Jun 2024 12:11:33 +0300
Organization: A noiseless patient Spider
Lines: 42
Message-ID: <20240604121133.0000499b@yahoo.com>
References: <v0s17o$2okf4$2@dont-email.me>
	<v31c4r$3u28v$1@dont-email.me>
	<v327n3$1use$1@gal.iecc.com>
	<BM25O.40665$HBac.4762@fx15.iad>
	<v32lpv$1u25$1@gal.iecc.com>
	<v33bqg$9cst$11@dont-email.me>
	<v34v62$ln01$1@dont-email.me>
	<v36bva$10k3v$2@dont-email.me>
	<2024May29.090435@mips.complang.tuwien.ac.at>
	<v38opv$1gsj2$3@dont-email.me>
	<v38rkd$1ha8a$1@dont-email.me>
	<jwvttifrysb.fsf-monnier+comp.arch@gnu.org>
	<f90b6e03c727b0f209d64484ec097298@www.novabbs.org>
	<v3jtd8$3qduu$2@dont-email.me>
	<20240603132227.00004e0f@yahoo.com>
	<v3mko3$c1kq$1@dont-email.me>
MIME-Version: 1.0
Content-Type: text/plain; charset=UTF-8
Content-Transfer-Encoding: quoted-printable
Injection-Date: Tue, 04 Jun 2024 11:11:20 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="f25b49b872d8aef0e7d27ed388edfd45";
	logging-data="367462"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX1/GKMPwCm+0YkmkXZcYGNkr46wT89xLxCA="
Cancel-Lock: sha1:G0HS5+jzVagH+IcWKBOToQ4xc+A=
X-Newsreader: Claws Mail 3.19.1 (GTK+ 2.24.33; x86_64-w64-mingw32)
Bytes: 3185

On Tue, 4 Jun 2024 10:54:27 +0200
Terje Mathisen <terje.mathisen@tmsw.no> wrote:

> Michael S wrote:
> > On Mon, 3 Jun 2024 08:03:53 -0000 (UTC)
> > Lawrence D'Oliveiro <ldo@nz.invalid> wrote:
> >  =20
> >> On Thu, 30 May 2024 18:31:46 +0000, MitchAlsup1 wrote:
> >> =20
> >>> 30 years ago you could say the same thing about encryption. =20
> >>
> >> I don=C3=A2=E2=82=AC=E2=84=A2t think newer CPUs have been optimized fo=
r encryption.
> >> Instead, we see newer encryption algorithms (or ways of using
> >> them) that work better on current CPUs. =20
> >=20
> > I think moderate efficiency on CPU, not too low, but not high
> > either, is a requirement for (symmetric-key) cipher. Esp. when the
> > key is 128-bit or shorter. =20
>=20
> That's correct:
>=20
> CPU efficiency, primarily on the reference 32-bit platform
> (PentiumPro 200 MHz) but also on an 8-bit "smart card" implementation
> was one of the key requirements for the AES competition.
>=20
> When a group of four programmers (including me) spent a week on
> CERN's candidate, we were able to triple the speed, bringing it into
> parity with the eventual winner. All the finalists were more or less
> the same speed at this point, i.e. able to do full duplex 100 Mbit/s
> Ethernet traffic (so around 20 MB/s) on a single thread/core.
>=20
> Terje
>=20

My point was that for symmetric cipher intended for use with "short"
keys, at least during a phase of standardization, exceptionally high
efficiency on existing CPUs would be considered a defect rather than
advantage.=20
Not necessarily so for "long" keys, where unbreakability by brute force
is taken for granted.