On Thu, 7 Dec 2000, P.J. Ponder wrote:
> from: http://www.ibm.com/news/2000/11/30.phtml
>
> IBM develops algorithm that encrypts and authenticates simultaneously
No word, of course, on how the thing actually works, or whether they
intend to patent it.
A note to the clueful about it being 'parellelizable' - almost all crypto
stuff can be parallelized by putting different tasks on different
processors, since the vast majority of crypto applications have multiple
tasks on a server going on at once. Parallelism works well for things
which require little interaction, and not at all for things which require
a lot.
-Bram Cohen
[Parallelism is NOT a trivial property. The maximum data rate you can
sustain depends a lot on whether or not an algorithm can be
implemented in parallel in hardware. Some algorithms, like various
keyed hashes, have bad properties in this regard. Claiming this isn't
important is just not correct -- for many applications it is. --Perry]