No. All it does is accelerate the encode/decode process for the data, not brute-force cracking of keys.
indeed bloody fast![]()
Would this chip be ideal for hacking or what?!
![]()
There's an AES test in Everest and it's off the scale!![]()
No. All it does is accelerate the encode/decode process for the data, not brute-force cracking of keys.
Depending on how the bruteforce is implemented, the decoding process is one of the slower ones, so this would be a boon to the hackers.
Though, it will still take an unworldly amount of time to actually break an AES encrypted file. Even going 20x faster.
I suppose. But generally brute forcing an AES key is the stupidest way to do it. But I suppose it would help.
23x200...nice. What cooling?
EK Supreme LT + TFC 480 + MCP650 H20 in 28-33C room ambients
1.456v idle vcore and 1.408-1.416v load with loadline calibration disabled (vdroop as per intel spec).
![]()
just noticed that chart you posted at http://www.legitreviews.com/images/reviews/1245/sandra_crypto.jpg must have cryptographic and sha256 values swapped around by accident hehe
Even if someone wanted to bruteforce AES (ahm well.. I hope he's got time), they wouldn't use a full x86 CPU, there would be better solutions for that - not cheap, but hey you'd also need a whole lot of 980s..
You'd also get a much better performance out of some GPUs - after all that stuff is probably one of the best non trivial usage scenarios for a SIMD architecture..
Well afaik Intel added those instructions to the x86 ISA, so you're using it, but just .1% of the whole transistor count probablyWell technically the CPU has dedicated AES hardware so you're not using x86.Someone correct me if that's wrong but that's usually how hardware works.
Well afaik Intel added those instructions to the x86 ISA, so you're using it, but just .1% of the whole transistor count probably![]()