Re: World's fastest hardware encryption
Udhay Shankar N wrote: found on slashdot, where it was headlined "The first step to cypherspace ?" http://www.sandia.gov/media/NewsRel/NR1999/encrypt.htm Sandia researchers develop world's fastest encryptor Soon will protect classified computer information ALBUQUERQUE, N.M. --The world's fastest encryption device, developed at the Department of Energy's (DOE) Sandia National Laboratories, should soon be protecting data being transmitted from supercomputers, workstations, telephones and video terminals. It encrypts data at more than 6.7 billion bits per second, 10 times faster than any other known encryptor. snip a superscalar implementation of DES (1 clock per round, 16 rounds of hardware) gives 6.7 Bps/64 bits per block or 104+ MHz clock. Should be able to do static key distribution accross the device, and 11 gate levels per round. That gives a number around 880 ps per gate with routing. Should be able to go 3 or 4 times faster. At least twice as fast with routing distances. You could also do a dual pipline... -- remove "no_spam_" from Reply-to address
Re: World's fastest hardware encryption
Udhay Shankar N [EMAIL PROTECTED] wrote: found on slashdot, where it was headlined "The first step to cypherspace ?" http://www.sandia.gov/media/NewsRel/NR1999/encrypt.htm Sandia researchers develop world's fastest encryptor Soon will protect classified computer information ALBUQUERQUE, N.M. --The world's fastest encryption device, developed at the Department of Energy's (DOE) Sandia National Laboratories, should soon be protecting data being transmitted from supercomputers, workstations, telephones and video terminals. It encrypts data at more than 6.7 billion bits per second, 10 times faster than any other known encryptor. snip They are doing DES in a pipelined fashion. You can obtain these speeds easily (using .25 or .18 micron chip technology), *provided* you're only crypting in ECB mode. Does anyone know if this chip can do CBC mode and what the speed of that is? -- Rieks Joosten Crypto Systems Software Architect Pijnenburg Custom Chips B.V. E-mail: [EMAIL PROTECTED] P.O. Box 330 Phone: +31 73 6848450 5260 AH Vught, The Netherlands Fax : +31 73 6848479 --
Documents received under the US FOIA in relation to AmbassadorAaron (was Re: ECARM NEWS for July 08,1999 First Ed.)
At 2:00 AM -0400 on 7/8/99, [EMAIL PROTECTED] wrote: Title: Documents received under the US FOIA in relation to Ambassador Resource Type: News Article Date: Tuesday, 06-Jul-99 Source: cyber-rights.org Author: cyber-rights.org Keywords: GOVT DOCUMENTS ,ENCRYPTION ,GOVT POLICY ,INFLUENCES Abstract/Summary: A recently published Cabinet Office paper entitled Encryption and Law Enforcement stated that "there must be a greater degree of international co-operation, particularly in relation to setting agreed standards." (para 7.10) The paper further stated that "there has been remarkably little co-ordination of policy on encryption matters" internationally apart from the OECD Guidelines on Cryptography Policy. However, the Aaron Files that we are bringing to the attention of the public through these pages suggest otherwise - that UK Government encryption policy was closely co-ordinated by the US despite the denial in the Cabinet Office paper which concluded that the result of the absence of such a co-ordination "has been a degree of misunderstanding and suspicion as to the rationale behind attempts to regulate, or influence, the domestic use of encryption." Original URL: http://www.cyber-rights.org/foia/usfoia.htm Added: Wed Jul 7 20:46:20 -040 1999 Contributed by: Keeffee - Robert A. Hettinga mailto: [EMAIL PROTECTED] The Internet Bearer Underwriting Corporation http://www.ibuc.com/ 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire'
Re: World's fastest hardware encryption
At 09:37 PM 7/7/99 -0700, David G. Koontz wrote: Udhay Shankar N wrote: found on slashdot, where it was headlined "The first step to cypherspace You should subscribe to cpunks, where this has been mentioned. http://www.sandia.gov/media/NewsRel/NR1999/encrypt.htm Should be able to do static key distribution accross the device, and 11 gate levels per round. That gives a number around 880 ps per gate with routing. Should be able to go 3 or 4 times faster. At least twice as fast with routing distances. You could also do a dual pipline... Your numbers are correct. You could put about a dozen fully-pipelined DES engines on an ASIC and get reasonable (e.g., commercial) yields. A 1-hour brute-force engine is the size of a laptop. Not counting SiGe.
No Subject
At 08:09 PM 7/7/99 -0500, William H. Geiger III wrote: Well it's only DES which we all know can easily be broken. Doing weak crypto really fast is not all that impressive to me. That's because you're trying to write, not read. Get it? Les Fedz