Deutsch   English   Français   Italiano  
<v3kt47$3vs3s$1@dont-email.me>

View for Bookmarking (what is this?)
Look up another Usenet article

Path: ...!weretis.net!feeder8.news.weretis.net!eternal-september.org!feeder3.eternal-september.org!news.eternal-september.org!.POSTED!not-for-mail
From: "Stephen Fuld" <SFuld@alumni.cmu.edu.invalid>
Newsgroups: comp.arch
Subject: Re: Byte Addressability And Beyond
Date: Mon, 3 Jun 2024 17:05:11 -0000 (UTC)
Organization: A noiseless patient Spider
Lines: 48
Message-ID: <v3kt47$3vs3s$1@dont-email.me>
References: <v0s17o$2okf4$2@dont-email.me> <v327n3$1use$1@gal.iecc.com> <BM25O.40665$HBac.4762@fx15.iad> <v32lpv$1u25$1@gal.iecc.com> <v33bqg$9cst$11@dont-email.me> <v34v62$ln01$1@dont-email.me> <v36bva$10k3v$2@dont-email.me> <2024May29.090435@mips.complang.tuwien.ac.at> <v38opv$1gsj2$3@dont-email.me> <v38rkd$1ha8a$1@dont-email.me> <jwvttifrysb.fsf-monnier+comp.arch@gnu.org> <f90b6e03c727b0f209d64484ec097298@www.novabbs.org> <v3jtd8$3qduu$2@dont-email.me> <20240603132227.00004e0f@yahoo.com> <k6k7O.8602$7jpd.5620@fx47.iad> <v3klhp$3ugeh$1@dont-email.me> <c7439653803f528f0f7d2b185431f373@www.novabbs.org>
MIME-Version: 1.0
Content-Type: text/plain; charset=utf-8
Content-Transfer-Encoding: 7bit
Injection-Date: Mon, 03 Jun 2024 19:05:11 +0200 (CEST)
Injection-Info: dont-email.me; posting-host="9d4b0d0d2bbc2f77954ebbfb6ef5a061";
	logging-data="4190332"; mail-complaints-to="abuse@eternal-september.org";	posting-account="U2FsdGVkX19jUA7Ha3kb08QDUpC0XVjB9U9jj78akKk="
User-Agent: XanaNews/1.21-f3fb89f (x86; Portable ISpell)
Cancel-Lock: sha1:qwIAnmLt1deqKCVcT2mW2LtanhI=
Bytes: 3495

MitchAlsup1 wrote:

> Stephen Fuld wrote:
> 
> > Scott Lurndal wrote:
> 
> >>Michael S <already5chosen@yahoo.com> writes:
> >>> On Mon, 3 Jun 2024 08:03:53 -0000 (UTC)
> > > 
> > > 
> > > High throughput encryption has been done by hardware accelerators
> > > for decades now (e.g. bbn or ncypher HSM boxes sitting on a SCSI
> > > bus; now such HSM are an integral part of many SoC).
> 
> 
> > Queston.  For a modern general purpose CPU, if you are including all
> > the logic to implement encryption instructions, is it much more to
> > include the control/sequencing logic to do it and not tie up the
> > rest of the CPU logic to do the encryption?  Furthermore, an
> > "inbuilt" accelerator could interface directly with the I/O
> > hardware of the CPU (e.g. PCI), saving the "intermediate" step of
> > writing the encrypted data to memory.
> 
> 
> It is more of a systems issue than an ISA issue:: Consider a chip
> with 100 cores, do you want all 100 cores to be doing encryption at
> the same
> 
> time, or do you only need a certain BW of encryption rather equal to
> the internet BW at hand. For the first instructions are a reasonable
> starting point, for the second an I/O (or attached) processor is in
> order.

I agree completely.  If all of the data to be en/decrypted is comming
from/going to an external device (network, storage device), then there
is no benefit to being able to encrypt at a faster rate than the total
I/O bandwidth.  I don't know what percentage of the data is destined
for external use, but my gut feel is that it is a lot, probably most,
possibly almost all.

If that is the case, then I think a good case can be made for putting
encryption somewhere within the I/O hardware, in order to avoid the
extra memory bandwidth and latency requirements of either instructions
or a "typical" attached processor.

-- 
 - Stephen Fuld 
(e-mail address disguised to prevent spam)