TTWO TTWO
Board Highlights
Topic List Post New Topic

MSG # GO



Rap Sheet

Author:

Jam ok

Subject:

Off Topic

Date:

01/08/18 at 6:21 PM CST

 

 

READ: 4

RPLY: 0

0

0

RECS:0

Sentiment:

Neutral

OT - Another take

<p>OT - Not that this is definitive, but one of my friends is well versed in most all things computer code related, so I though I'd share his reaction.   I sent him the Barron's article, and his take on it was this:</p> <p>"<span>At first blush, the technique seems to be dependent on knowledge of the hardware at each end of the encryption.  If so, that would limits its universality.</span></p> <p>Specifically, the technique would need to know the register configuration, details of the CPU fetch-execute cycles, and CPU microcode.  An Intel i7 chip would work one way with a matching i7 at the other end, but differently with an AMD Ryzen chip at the other end.  Both Intel and AMD have the ability to update the microcode in their chips at any time, so the firmware version would be important.  All of these chips run multiprocessor / multi-threaded with non-deterministic instruction look-ahead.  The logistics might be cumbersome, at best.  </p> <p>Also, the article describes pretty clearly what the technique is and, if it works, enables other people to implement something similar."</p>

Copyright 2014 All Rights Reserved; Patent Pending