Is there a mailing list that I can ask Rijndael-specific questions?

On Sat, Mar 16, 2013 at 3:25 AM, Ewen Chan <chan.e...@gmail.com> wrote:
> Interesting...
>
> Does this necessarily implicitly implies that the Rijndael cipher was
> selected as the AES "winner" because it was also "simple" enough to be
> fast, while meeting the security and protection requirements when they
> initiated the open call for proposals?
>
> I didn't realize that the AES and also modern processors were so fast
> already. I always thought that AES was going to be a fairly slow and
> compute-intensive process; and so that's why I was trying to make sure
> that the AES-NI was working. Turns out, I might not even need it. #FML
>
> (And I'm pretty sure that some of you guys were probably telling me
> that, but I didn't realize it then. Now I see the light.)
>
> On Sat, Mar 16, 2013 at 1:29 AM, Matthew Hall <mh...@mhcomputing.net> wrote:
>> On Sat, Mar 16, 2013 at 01:16:23AM -0400, Ewen Chan wrote:
>>> Okay then, here's another one of my infamous dumb questions.
>>>
>>> If that's the case, then why do we need the AES-NI instruction set?
>>
>> It's far from the first accelerated instruction set of dubious utility. ;)
>>
>> Marketing... etc.
>>
>> Actually, SSL / TLS performance is much more greatly increased by an RSA
>> accelerator. If I were Intel I would have made that first, before AES-NI,
>> because RSA signs and verifies consume a lot more resources and are a lot 
>> more
>> vulnerable to DoS than AES. But, of course, RSA is more complex.
>>
>> The tech companies are not trying to make the best possible product, but the
>> best product that's economically feasible, which is a slightly different 
>> goal.
>>
>>> If it's likely going to be storage and/or network bandwidth limited;
>>> wouldn't the improvements made by introducing and incorporating the
>>> AES-NI instruction set be kind of "wasted" in the sense that you can't
>>> really use it to the fullest potential anyways?
>>
>> Amdahl's Law: the amount of overall improvement of performance by improving 
>> an
>> area is proportional to the amount that area is executed.
>>
>>> If the storage/network I/O is going to be your bottleneck/limiting
>>> factor, then regardless of whether you have AES-NI or not; you're
>>> likely going to get the same answer in terms of speed.
>>
>> Yes!
>>
>>> Also, is that why (besides the fact that CBC can't be parallelized)
>>> why it doesn't make sense or people really haven't spent too much time
>>> or effort into trying to run AES encryption/decryption on GPGPUs?
>>> Because it's already faster than anything else is capable of at the
>>> moment?
>>
>> Like Erwann said, the memory transfers would likely cost more time than using
>> AES-NI.
>> ______________________________________________________________________
>> OpenSSL Project                                 http://www.openssl.org
>> User Support Mailing List                    openssl-users@openssl.org
>> Automated List Manager                           majord...@openssl.org
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to