Talk:AES instruction set
This article is rated C-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||||||||||||||||||
|
Software supporting AES instruction set
[edit]Would anyone object to limiting software to software libraries? It seems like the list will grow until it is unmanageable if the only restriction is software. If the restriction is software libraries, the growth will be checked, and it will provide useful information for programmers who need a list of supporting libraries.
JW Noloader (talk) 02:00, 13 August 2010 (UTC)
Windows' Bitlocker should also be added to the list. 72.80.29.25 (talk) 14:55, 12 July 2011 (UTC)
I don't see any evidence that [Oracle] Java 7 HotSpot supports AES. Java 8 appears to, based on the appearance of new "intrinsics" and my own performance testing. twimoki (talk) 03:21, 24 June 2013 (UTC)
Security
[edit]There is no discussion about security implications. In the non-hw assisted case the CPU has a hard time figuring out what is your key. In this case, you're essentially giving a black box your key, AND telling it the semantics too "this here is my key".
How can you be sure there isn't (for example) a built-in SRAM cache which stores the most-recently used 500 keys?
94.254.76.147 (talk) 09:37, 2 June 2011 (UTC)
Comparison with a Pentium 4
[edit]I think this comparison is...questionable. Especially considering, that a Pentium 4 is well known to have the worst IPC of its generation, and was out of date by three generations by the time AES-NI became available, including one major and one minor architectural change. So looking at the cycles per byte of the worst offender of long pipelines, with the Netburst architecture, and the cycles per byte using optimized, dedicated logic is very strange. A comparison with a pure software implementation on the same platform would be interesting, or maybe with a previous platform, but a comparison with a P4 appears rather useless. 193.49.124.107 (talk) 08:27, 17 August 2011 (UTC)
Evaluation of the Carryless multiplication
[edit]The carryless multiplication instruction is also discussed here: http://ieeexplore.ieee.org/xpls/abs_all.jsp?arnumber=4358294&tag=1 and here: http://vega.dii.unisi.it/~giorgi/papers/Branovic03a.pdf — Preceding unsigned comment added by Robgiorgi (talk • contribs) 10:53, 8 June 2014 (UTC)
Deleting the "Supporting software" section
[edit]I think this is a good idea. Most mature crypto programs with performance-relevance support AES-NI these days. The existing list is needlessly huge and includes some little-used stuff. It seems like a good place for a vendor of a lesser-used product to slip in a free advertisement.
Objections? Risc64 (talk) 17:49, 30 December 2015 (UTC)
I agree --208.87.223.18 (talk) 01:43, 12 August 2018 (UTC)
Deleting the "Supporting x86 CPUs" section
[edit]This section has nothing to do w/ AES instructions as they are using specialized hardware that requires drivers. They should be moved to a new page talking about cryptography accelerators (such as HiFn cards).
--208.87.223.18 (talk) 01:41, 12 August 2018 (UTC)
There's already a Cryptographic accelerator page that needs expansion but it covers more than AES. I disagree that the "Supporting x86 CPUs" section should be moved there, rather this page should be repurposed to talk about AES accelation in general. PeterJeremy (talk) 08:52, 3 May 2021 (UTC)
External links modified
[edit]Hello fellow Wikipedians,
I have just added archive links to one external link on AES instruction set. Please take a moment to review my edit. If necessary, add {{cbignore}}
after the link to keep me from modifying it. Alternatively, you can add {{nobots|deny=InternetArchiveBot}}
to keep me off the page altogether. I made the following changes:
- Added archive https://web.archive.org/20101126155830/http://blogs.amd.com:80/work/2010/11/22/following-instructions/ to http://blogs.amd.com/work/2010/11/22/following-instructions/
When you have finished reviewing my changes, please set the checked parameter below to true to let others know.
An editor has reviewed this edit and fixed any errors that were found.
- If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
- If you found an error with any archives or the URLs themselves, you can fix them with this tool.
Cheers.—cyberbot IITalk to my owner:Online 06:48, 28 January 2016 (UTC)
External links modified
[edit]Hello fellow Wikipedians,
I have just modified 2 external links on AES instruction set. Please take a moment to review my edit. If you have any questions, or need the bot to ignore the links, or the page altogether, please visit this simple FaQ for additional information. I made the following changes:
- Added archive https://web.archive.org/web/20080407095317/http://softwareprojects.intel.com/avx/ to http://softwareprojects.intel.com/avx/
- Added archive https://web.archive.org/web/20111111212545/http://www.via.com.tw/en/products/processors/eden-n/ to http://www.via.com.tw/en/products/processors/eden-n/
When you have finished reviewing my changes, you may follow the instructions on the template below to fix any issues with the URLs.
This message was posted before February 2018. After February 2018, "External links modified" talk page sections are no longer generated or monitored by InternetArchiveBot. No special action is required regarding these talk page notices, other than regular verification using the archive tool instructions below. Editors have permission to delete these "External links modified" talk page sections if they want to de-clutter talk pages, but see the RfC before doing mass systematic removals. This message is updated dynamically through the template {{source check}}
(last update: 5 June 2024).
- If you have discovered URLs which were erroneously considered dead by the bot, you can report them with this tool.
- If you found an error with any archives or the URLs themselves, you can fix them with this tool.
Cheers.—InternetArchiveBot (Report bug) 23:22, 23 June 2017 (UTC)
VeraCrypt AES-NI support
[edit]Consider adding VeraCrypt to the list of supporting software? [1] — Preceding unsigned comment added by MetalFusion81 (talk • contribs) 14:19, 23 March 2019 (UTC)
- Done. I'm surprised it was missing. peterl (talk) 19:43, 23 March 2019 (UTC)
- Thank you. MetalFusion81 (talk) 01:25, 24 March 2019 (UTC)
AES acceleration via instructions vs co-processors
[edit]This page covers accelerated AES implementations via a mixture of instructions that directly implement parts of AES (eg x86 AES-NI and ARMv8 Crypto Extension) and integrated crypto engines (VIA Padlock, RISC-V, older ARMs etc). There's a reference above that suggests getting rid of the "Supporting x86 CPUs" section on the basis that the integrated crypto engines are no different to HiFn cards, and that could equally well apply to many other parts of the hardware listed on this page.
I agree that there's a distinction between implementing AES via (eg) the AES-NI or using the VIA Padlock but I don't agree that just throwing out the latter is the correct approach. There's already a Cryptographic accelerator page, but it discusses crypto acceleration in general, whereas this page is specific to AES. I therefore suggest that this page be renamed to AES acceleration (swapping the current redirection direction) and reworded to cover both integrated instruction support and co-processor support for AES.
- C-Class Cryptography articles
- Low-importance Cryptography articles
- C-Class Computer science articles
- Low-importance Computer science articles
- WikiProject Computer science articles
- WikiProject Cryptography articles
- C-Class Computing articles
- Low-importance Computing articles
- C-Class software articles
- Low-importance software articles
- C-Class software articles of Low-importance
- All Software articles
- C-Class Computer hardware articles
- Low-importance Computer hardware articles
- C-Class Computer hardware articles of Low-importance
- C-Class Computer Security articles
- Low-importance Computer Security articles
- C-Class Computer Security articles of Low-importance
- All Computer Security articles
- All Computing articles