No. All it does is accelerate the encode/decode process for the data, not brute-force cracking of keys.
indeed bloody fast 🙂
Would this chip be ideal for hacking or what?!
![]()
There's an AES test in Everest and it's off the scale! 😱
No. All it does is accelerate the encode/decode process for the data, not brute-force cracking of keys.
Depending on how the bruteforce is implemented, the decoding process is one of the slower ones, so this would be a boon to the hackers.
Though, it will still take an unworldly amount of time to actually break an AES encrypted file. Even going 20x faster.
I suppose. But generally brute forcing an AES key is the stupidest way to do it. But I suppose it would help.
23x200...nice. What cooling?
EK Supreme LT + TFC 480 + MCP650 H20 in 28-33C room ambients 🙂
1.456v idle vcore and 1.408-1.416v load with loadline calibration disabled (vdroop as per intel spec).
![]()
just noticed that chart you posted at http://www.legitreviews.com/images/reviews/1245/sandra_crypto.jpg must have cryptographic and sha256 values swapped around by accident hehe
Even if someone wanted to bruteforce AES (ahm well.. I hope he's got time), they wouldn't use a full x86 CPU, there would be better solutions for that - not cheap, but hey you'd also need a whole lot of 980s..
You'd also get a much better performance out of some GPUs - after all that stuff is probably one of the best non trivial usage scenarios for a SIMD architecture..
Well afaik Intel added those instructions to the x86 ISA, so you're using it, but just .1% of the whole transistor count probably 😉Well technically the CPU has dedicated AES hardware so you're not using x86. 😉 Someone correct me if that's wrong but that's usually how hardware works.
Well afaik Intel added those instructions to the x86 ISA, so you're using it, but just .1% of the whole transistor count probably 😉