Page 1 of 2 12 LastLast
Results 1 to 10 of 11

Thread: AMD Publishes Cryptographic Coprocessor Linux Code

  1. #1
    Join Date
    Jan 2007
    Posts
    14,810

    Default AMD Publishes Cryptographic Coprocessor Linux Code

    Phoronix: AMD Publishes Cryptographic Coprocessor Linux Code

    AMD has just published a new set of Linux kernel patches, revealing Linux support for a Cryptographic Coprocessor (AMD CCP)...

    http://www.phoronix.com/vr.php?view=MTUxMTk

  2. #2
    Join Date
    Apr 2008
    Location
    Saskatchewan, Canada
    Posts
    462

    Default

    But who's going to trust an encryption black box these days? Particularly from a US company?

    Even Intel's AES instructions are dubious; you can verify they encrypt properly in your tests, but you can't verify there isn't some hidden switch in a configuration register or undocumented instruction somewhere which will make them spew out plaintext instead.

  3. #3
    Join Date
    Sep 2008
    Posts
    264

    Default

    AMD Publishes Cryptographic Coprocessor Linux Code
    Quote Originally Posted by movieman View Post
    But who's going to trust an encryption black box these days? Particularly from a US company?
    Need some reading comprehension there?

  4. #4
    Join Date
    Jul 2013
    Posts
    382

    Default

    Quote Originally Posted by Detructor View Post
    Need some reading comprehension there?
    He's talking about using the hardware encryption provided by this drivers code (the co-processor).

  5. #5
    Join Date
    Dec 2008
    Location
    Vermont
    Posts
    101

    Default

    Is this a separate chip, or is it something embedded in some class of CPUs or North/South-bridges, and we haven't had access to it until now?

    If it's already embedded, what chips, what vintages?

  6. #6
    Join Date
    Mar 2012
    Posts
    121

    Default

    i think it's for the future arm-on-opteron thing that amd was promoting a while ago

  7. #7
    Join Date
    Oct 2012
    Location
    Washington State
    Posts
    458

    Default

    Quote Originally Posted by movieman View Post
    But who's going to trust an encryption black box these days? Particularly from a US company?

    Even Intel's AES instructions are dubious; you can verify they encrypt properly in your tests, but you can't verify there isn't some hidden switch in a configuration register or undocumented instruction somewhere which will make them spew out plaintext instead.
    Stop being delusional. If you think the heads-of-state weren't in on the game to manage patterns from the NSA you truly are daft.

  8. #8
    Join Date
    Jun 2011
    Posts
    109

    Default AMD TrustZone

    This just sounds like the Linux drivers for the AMD TrustZone functionality that we've known about for some time.

    http://www.anandtech.com/show/6007/a...e-capabilities

  9. #9
    Join Date
    Jan 2013
    Posts
    1,456

    Default

    Quote Originally Posted by movieman View Post
    But who's going to trust an encryption black box these days? Particularly from a US company?
    Idiots, that's who.

  10. #10
    Join Date
    Feb 2008
    Location
    Linuxland
    Posts
    5,104

    Default

    The only mentioned pci id, 0x1537, gives no results on the wonderland of google, nor in pciids.

    So either a completely new block, or a well-hidden secret.

Posting Permissions

  • You may not post new threads
  • You may not post replies
  • You may not post attachments
  • You may not edit your posts
  •