[Cryptography] What's the point of low-latency cryptography?

Ryan Carboni ryacko at gmail.com
Mon Nov 28 16:02:19 EST 2016

What is the actual latency that would cause pipeline stalls? I would think
that most computations on a computer require at least a hundred cycles
before the result is presented to the user. RAM to begin with requires ten
nanoseconds to retrieve data. Nearly all single-cycle implementations are
probably smaller than the gate area required for a DDR4 Bus.


Although a more holistic approach would use a seekable stream cipher to
generate independent subkeys for a block cipher the size of each
addressable word (which appears to be the byte). This would be vulnerable
to codebook attacks if one can somehow read the encrypted output and submit
256 plaintexts if one knows the address of the data one wishes to

Given that Chrome isn't totally sandboxed, secure enclaves certainly won't
protect against all attacks.

Ideally an operating system would have the security features of OpenBSD,
grsec, and the architecture would aid in securing it.
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://www.metzdowd.com/pipermail/cryptography/attachments/20161128/b7b9d598/attachment.html>

More information about the cryptography mailing list