Re: [Firebird-devel] Crypto Performance

2015-09-21 Thread Boris Damjanovic
Agree. On 9/21/2015 12:04 PM, Michal Kubecek wrote: > On Tue, Sep 15, 2015 at 11:22:22AM -0400, Jim Starkey wrote: >> 1. As Sean pointed out, the AES instructions are common on Intel >> processors. Not so for AMD, however, which only supports AES in >> their high end server chips. >

Re: [Firebird-devel] Crypto Performance

2015-09-21 Thread Jim Starkey
On 9/18/2015 3:05 PM, Boris Damjanovic wrote: > I would like to bring your attention to the AES-XTS mode >- http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf > and to the CTR mode >- http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf > -

Re: [Firebird-devel] Crypto Performance

2015-09-21 Thread Michal Kubecek
On Tue, Sep 15, 2015 at 11:22:22AM -0400, Jim Starkey wrote: > 1. As Sean pointed out, the AES instructions are common on Intel > processors.  Not so for AMD, however, which only supports AES in > their high end server chips. Definitely not true. Both my recent AMD CPU's (FX-8150 and FX-4350)

Re: [Firebird-devel] Crypto Performance

2015-09-18 Thread Boris Damjanovic
I would like to bring your attention to the AES-XTS mode - http://csrc.nist.gov/publications/nistpubs/800-38E/nist-sp-800-38E.pdf and to the CTR mode - http://csrc.nist.gov/publications/nistpubs/800-38a/sp800-38a.pdf - https://tools.ietf.org/html/rfc4106 -

Re: [Firebird-devel] Crypto Performance

2015-09-15 Thread Jim Starkey
I don't know of any known problems with AES/CBC. It is simply the most trusted crypto algorithm in the history of computing. It isn't possible prove that something can't be broken, but many, many very smart people have spent many years searching for an attack over 15+ years without success.

Re: [Firebird-devel] Crypto Performance

2015-09-15 Thread Leyne, Sean
Jim, > I don't know of any known problems with AES/CBC. It is simply the most > trusted crypto algorithm in the history of computing. It isn't possible prove > that something can't be broken, but many, many very smart people have > spent many years searching for an attack over 15+ years without

Re: [Firebird-devel] Crypto Performance

2015-09-15 Thread Mark Rotteveel
Do you know AES-NI also support AES/GCM (Gaulois Counter Mode)? I have read several articles that advise to use AES/GCM as a replacement of RC4, as it address some of the problems with AES/CBC (known plaintext attack). Mark On Tue, 15 Sep 2015 11:22:22 -0400, Jim Starkey

[Firebird-devel] Crypto Performance

2015-09-15 Thread Jim Starkey
I've done some moderately careful performance apples to apples comparisons for various crypto functions with not very surprising results. In general: AES-NI < RC4 < ChaCha20 < AES (software) The two AES functions, the Botan software version and the DJ Bernstein NI (new instructions)

Re: [Firebird-devel] Crypto Performance

2015-09-15 Thread Leyne, Sean
Jim, > 1. As Sean pointed out, the AES instructions are common on Intel > processors.  Not so for AMD, however, which only supports AES in their high > end server chips.  My HP AMD mini-tower, for example, doesn't have the > AES instruction set. It seems that AMD might be exaggerating their

Re: [Firebird-devel] Crypto Performance

2015-09-15 Thread Jim Starkey
On 9/15/2015 12:24 PM, Leyne, Sean wrote: > Jim, > >> I don't know of any known problems with AES/CBC. It is simply the most >> trusted crypto algorithm in the history of computing. It isn't possible >> prove >> that something can't be broken, but many, many very smart people have >> spent many

Re: [Firebird-devel] Crypto Performance

2015-09-15 Thread Leyne, Sean
> None of these suggest that there is an attack -- read the comments. They refer to a possible attack and provide links to other sites. One of the sites has a link to the following: http://www.iacr.org/archive/eurocrypt2002/23320530/cbc02_e02d.pdf which (at least to my scanned reading)

Re: [Firebird-devel] Crypto Performance

2015-09-15 Thread Jim Starkey
On 9/15/2015 12:57 PM, Leyne, Sean wrote: > >> None of these suggest that there is an attack -- read the comments. > They refer to a possible attack and provide links to other sites. One of the > sites has a link to the following: > >