Re: RSA performance on Athlon64 vs. Itanium

2003-10-23 Thread J.A. Terranson
On Sun, 12 Oct 2003, Lucky Green wrote:

 I just picked up an Athlon64 3200+, which runs at a 2 GHz clock speed.
 Using the Red Hat for AMD64 beta and the version of OpenSSL that ships
 with that beta, I get 922 1024-bit RSA signs per second. This is a tad
 less RSA signatures per second than I have seen on an 800MHz Itanium
 using highly optimized assembler. That's rather poor performance on the
 Athlon64.
 
 Are the figures that I am seeing typical for OpenSSL on the Athlon64?
 Has anybody here seen different figures using optimized code?
 
 Thanks,
 --Lucky Green

Was there ever a reply to this?  If so, could someone forward it to me
off-list, as I missed it :-(

Thanks!

-- 
Yours, 
J.A. Terranson
[EMAIL PROTECTED]

Every living thing dies alone.
Donnie Darko



Palladium/TCPA/NGSCB

2003-10-23 Thread Bill Frantz
Mark Miller pointed out to me that currently much of our protection from
viruses comes from people at the anti-virus companies who quickly grab each
new virus, reverse engineer it, and send out information about its payload
and effects.  Any system which hides code from reverse engineering will
make this process more difficult.  To the extend that Palladium/TCPA/NGSCB
hides code, and to the extent it succeeds at this hiding, the more it
encourages new and more pervasive viruses.

Cheers - Bill


-
Bill Frantz| There's nothing so clear as a | Periwinkle
(408)356-8506  | vague idea you haven't written | 16345 Englewood Ave
www.pwpconsult.com | down yet. -- Dean Tribble | Los Gatos, CA 95032



Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)

2003-10-23 Thread Dave Emery
On Wed, Oct 22, 2003 at 04:47:02PM -0700, Steve Schear wrote:
 
 I think the U.S. Constitution will stand in the way of widespread adoption 
 of NDLs.  They may have regulated firearms, though these laws are widely 
 ignored by citizens, but I have yet to see a license for owning a 
 typewriter or PC proposed.  They have already ruled numerous times that the 
 Internet is deserving of at least as free and access as print media and 
 political flyers (which can be anonymnous and still pass legal muster).
 

You are an optimist.  Us pessimists see use of
Palladium/TCPA/NGSCB as all too tempting a means of regulation of the
net.   Initially one will not be able to get high speed Internet service
at affordable rates without the big brother inside, but as this
voluntary commercial regulatory measure proves not to curb behavior
that certain powerful lobbies want controlled, there will be mandatory
requirements imposed by law as per the Fritz chip.

Perhaps courts will not allow such to be used for explicit
censorship of otherwise legal free speech, but I'd not bet that an ISP
would be required to allow objectionable content to pass over its
wires under such a scheme.

And once one must register to obtain certificates for Palladium/NGSCB
attestation, one really does have a form of net drivers license.

 steve  

-- 
   Dave Emery N1PRE,  [EMAIL PROTECTED]  DIE Consulting, Weston, Mass 02493



RE: C3 Nehemia C5P with better hardware RNG and AES support

2003-10-23 Thread Lucky Green
Peter wrote:
 In case anyone's interested, there's a cpu die photo at 
 http://www.sandpile.org/impl/pics/centaur/c5xl/die_013_c5p.jpg
 showing the amount of real estate consumed by the crypto functions
(it's the bottom centre, a bit hard to read the label).


I fail to understand why VIA bothered adding AES support into the CPU.
When was AES last the bottleneck on a general-purpose CPU? The
bottleneck tends to be modular exponentiations, yet VIA failed to
include a modular exponentiation engine. Strange.

--Lucky Green



RE: RSA performance on Athlon64 vs. Itanium

2003-10-23 Thread Lucky Green
 -Original Message-
 From: J.A. Terranson [mailto:[EMAIL PROTECTED] 
 Sent: Wednesday, October 22, 2003 18:46
 To: Lucky Green
 Cc: [EMAIL PROTECTED]
 Subject: Re: RSA performance on Athlon64 vs. Itanium
 
 
 
 On Sun, 12 Oct 2003, Lucky Green wrote:
 
  I just picked up an Athlon64 3200+, which runs at a 2 GHz 
 clock speed. 
  Using the Red Hat for AMD64 beta and the version of OpenSSL 
 that ships 
  with that beta, I get 922 1024-bit RSA signs per second. 
 This is a tad 
  less RSA signatures per second than I have seen on an 
 800MHz Itanium 
  using highly optimized assembler. That's rather poor performance on 
  the Athlon64.
  
  Are the figures that I am seeing typical for OpenSSL on the 
 Athlon64? 
  Has anybody here seen different figures using optimized code?
  
  Thanks,
  --Lucky Green
 
 Was there ever a reply to this?  If so, could someone forward 
 it to me off-list, as I missed it :-(

J.A.,
I since ran additional tests. All tests are for 1024-bit RSA signatures.

1) OpenSSL as shipping with the RedHat Taroon beta for Athlon 64:

921 RSA signatures/second

2) OpenSSL compiled manually:

1313 RSA signatures/second

3) Performance benchmark application made available to reviewers:

Exceeding 3800 RSA signatures/second.

Reading various gamer and over clocker websites, the Athlon 64 general
performance is testing at about par with the Intel P4 3.2GHz, faster in
some tests, slower in others. With the Athlon 64 being the slightly less
expensive CPU based on the prices I have seen around here. You basically
get a 64-bit CPU for the price of a 32-bit CPU.

The CPU seems to be catching on amongst the early adopter crowd. A
friend just bought one for 32-bit gaming and is very pleased.

Motherboards for the Athlon 64 are appearing rapidly. Two weeks ago,
Fry's stocked one Athlon 64 motherboard. Today, Fry's had 3 of them.

Looks like AMD may have some done something right with this CPU. I am
getting ready to buy a second one to upgrade my other box at home.

--Lucky Green



Dept. of Defense IPv6 Interoperabilty Test Begins (fwd from brian-slashdotnews@hyperreal.org)

2003-10-23 Thread Eugen Leitl
Bundesministerium fuer Verteidigung, too:

http://www.heise.de/newsticker/data/anw-21.10.03-000/
/kraut

- Forwarded message from [EMAIL PROTECTED] -

From: [EMAIL PROTECTED]
Date: 22 Oct 2003 22:26:03 -
To: [EMAIL PROTECTED]
Subject: Dept. of Defense IPv6 Interoperabilty Test Begins
User-Agent: SlashdotNewsScooper/0.0.3

Link: http://slashdot.org/article.pl?sid=03/10/22/1755258
Posted by: CowboyNeal, on 2003-10-22 20:01:00
Topic: internet, 259 comments

   from the let's-get-it-on dept.
   [1]securitas writes The [2]Department of Defense has launched Phase I
   of its delayed IPv6 interoperability test ([3]mirror) in a six-month
   project dubbed [4]Moonv6. It is the [5]largest North American IPv6
   test ever and its goal is to evaluate IPv6 for 'network-centric
   military operations.' Phase II was originally scheduled to begin in
   January 2004 but may be delayed due to the late start of the current
   test. 'IPv4 addresses are 32 bits long, enough for around 4 billion
   unique addresses.' In contrast, the IPv6 address length is '128 bits,
   or 340 billion billion billion billion unique addresses.' Experts hope
   this will solve a predicted IP address shortage as more devices are
   created to use the Internet.

   [6]Click Here

References

   1. http://geartest.com/
   2.
http://www.computerworld.com/governmenttopics/government/story/0,10801,86243,
00.html
   3. http://www.linuxworld.com.au/index.php?id=1854687864fp=2fpid=1
   4. http://www.moonv6.org/
   5. http://dc.internet.com/news/article.php/3095951
   6.
http://ads.osdn.com/?ad_id=78alloc_id=1118site_id=1request_id=168131op=cl
ickpage=%2farticle%2epl

- End forwarded message -
-- Eugen* Leitl a href=http://leitl.org;leitl/a
__
ICBM: 48.07078, 11.61144 http://www.leitl.org
8B29F6BE: 099D 78BA 2FD3 B014 B08A  7779 75B0 2443 8B29 F6BE

[demime 0.97c removed an attachment of type application/pgp-signature]



Re: [mnet-devel] DOS in DHTs (fwd from amichrisde@yahoo.de)

2003-10-23 Thread Morlock Elloi
 ignored by citizens, but I have yet to see a license for owning a 
 typewriter or PC proposed.  They have already ruled numerous times that the 
 Internet is deserving of at least as free and access as print media and 


There are precedents. In Franko's Spain, all typewriters had to be registered
with the state, and all had serial numbers. It was illegal and punishable to
possess one without license.



=
end
(of original message)

Y-a*h*o-o (yes, they scan for this) spam follows:

__
Do you Yahoo!?
The New Yahoo! Shopping - with improved product search
http://shopping.yahoo.com



RE: C3 Nehemia C5P with better hardware RNG and AES support

2003-10-23 Thread Steve Schear
At 11:04 PM 10/22/2003 -0700, Lucky Green wrote:
Peter wrote:
 In case anyone's interested, there's a cpu die photo at
 http://www.sandpile.org/impl/pics/centaur/c5xl/die_013_c5p.jpg
 showing the amount of real estate consumed by the crypto functions
(it's the bottom centre, a bit hard to read the label).
I fail to understand why VIA bothered adding AES support into the CPU.
When was AES last the bottleneck on a general-purpose CPU? The
bottleneck tends to be modular exponentiations, yet VIA failed to
include a modular exponentiation engine. Strange.
Cylink made it mark in the early 90s by building the first commercial 
modular exponentiation chips to power its encryptor boxes.  So the need for 
it this was well known even then.

steve 



RE: C3 Nehemia C5P with better hardware RNG and AES support

2003-10-23 Thread Major Variola (ret)
At 11:04 PM 10/22/03 -0700, Lucky Green wrote:
I fail to understand why VIA bothered adding AES support into the CPU.
When was AES last the bottleneck on a general-purpose CPU? The
bottleneck tends to be modular exponentiations, yet VIA failed to
include a modular exponentiation engine. Strange.

Lucky, the VIA chip is for SOHO not servers.   Therefore modexp is
not a bottleneck, its a one time cost well performed by the
x86 in a few hundred msec.  On the other hand, the AES hardware could
provide
a substantial relief for the CPU for VPN apps, despite its relative
ease in software compared to DES.

Remember that the modexp cores out there are generally intended
for high end apps like commercial-server cards.  Though their gate
count isn't too bad, they tend to require a large number of RAM
controllers and embedded RAM for the operands.  If you've got
a good fraction of a second to spend, and have a general purpose
CPU, you don't need hardware acceleration for modexp.

As I wrote previously, I'd expect to see better integrated peripheral
support (eg integrated ether or two) before I saw modexp support.

---
The generation of random numbers is too important to be left to
chance.
 -Robert R. Coveyou ORNL mathematician



RE: C3 Nehemia C5P with better hardware RNG and AES support

2003-10-23 Thread Major Variola (ret)
At 07:04 AM 10/23/03 -0700, Steve Schear wrote:
At 11:04 PM 10/22/2003 -0700, Lucky Green wrote:
bottleneck tends to be modular exponentiations, yet VIA failed to
include a modular exponentiation engine. Strange.

Cylink made it mark in the early 90s by building the first commercial
modular exponentiation chips to power its encryptor boxes.  So the need
for
it this was well known even then.

Yes, because CPUs couldn't/can't keep up with SSL's DH modexp at
*commercial server*  rates.   For lower rates, eg initiating a secure
phone call, or the client-side of SSL, you can tolerate the delay of
using a CPU.  You only dedicate hardware if you need to do
something a lot, and fast.  Could be polygons on a gaming video
board, mbuff operations in a network processor [1], or modexp
on an SSL enhancer.

[1] look into Intel's IXA processors.  They have hardware support
for everything you do in IP stack processing.  Amazing.  Later versions
also include linerate AES.  For large values of linerate.



Re: Palladium/TCPA/NGSCB

2003-10-23 Thread Major Variola (ret)
At 11:06 PM 10/22/03 -0700, Bill Frantz wrote:
Mark Miller pointed out to me that currently much of our protection
from
viruses comes from people at the anti-virus companies who quickly grab
each
new virus, reverse engineer it, and send out information about its
payload
and effects.

You could be talking about biology as well.

Any system which hides code from reverse engineering will
make this process more difficult.  To the extend that
Palladium/TCPA/NGSCB
hides code, and to the extent it succeeds at this hiding, the more it
encourages new and more pervasive viruses.

A virus that contains friendly IFF codes can evade an immune system.
Some cloak themselves in membranes derived from cells they were born in.

Thus they present the right IFF response.

A virus that appears to Palladium to be friendly and worthy of the full
protection
-the right hashes, etc- will be a fun thing.

Some virii are innocuous except when they pick up a piece of virulence
code.  Then they kill.  IIRC anthrax is like this, some of the streps.
One can imagine writing a virus which is in fact merely a bit of
virulence code taken in by an other innocuous but replicating program.

Its common in biolabs to cross a hard-to-grow nasty with an easy-to-grow

labbug so you can study the nasty.  Sometimes, the result is dangerous.
See
the synthetic mousepox which killed the mice.

And virii that infect the immune system can be fun too --imagine a virus

infecting your antiviral program.  HIV for Windows.



Re: Palladium/TCPA/NGSCB

2003-10-23 Thread Eric Murray
On Thu, Oct 23, 2003 at 11:59:47AM -0700, Major Variola (ret) wrote:
 And virii that infect the immune system can be fun too --imagine a virus
 infecting your antiviral program.  HIV for Windows.


Or a virus that modifes your other programs to make them appear to
be known virii.  You'd have to turn off your AV progams
to keep them from destroying your files (or moving them
around, going crazy with warnings when you start any program, etc)

I'd bet that no AV programs have safeguards against this
sort of false positive attack.

Eric