[Cryptography] GHCQ Penetration of Belgacom

hbaker1 hbaker1 at pipeline.com
Sat Dec 20 12:31:22 EST 2014


>From: dan at geer.org
>
> | I think it would be very hard to find a backdoor suggested by 
> | Norm Hardy.  Modify the CPU to detect when two specific floating 
> | point numbers are multiplied.  When they are, execute the next 
> | instruction in privileged mode.
>
>It's my second-hand understanding that it would take perhaps 3,000
>gates to implement intentional sensitivity to a pre-designed kill
>packet.  The addition of 3,000 gates to any current chipset will
>never be found in current hardware, e.g., the iPhone 6 has two
>billion transistors on the system chip.
>
>Others more knowledgeable welcome to correct my understanding.

So Intel&Apple have provided PRC with netlists for their processor
chips?

Of course, PRC shouldn't believe them, unless they could also
manufacture their own chips from the netlists.



More information about the cryptography mailing list