Ibm des

Analog of des countermeasures : cache subversion countermeasures.

Note how ibm hardware expertise in 1970s micro design and onboard instruction caching leads directly to des unique character (permuted sbox lines).

Lets take a guess that as part of designing tempest countermeasures for custom die maxe to order in the 1970s, ibm figures how to avoid letting vlsi traces have sufficient information from which to recreate cache line dependencies, that reveal keys. As a sideeffect, it not only “discovers” differential cryptanalysis, but also happens to learn from permuting cache lines of +compressed+ tables (think sboxes) the basic countermeasures of spns.


About home_pw

Computer Programmer who often does network administration with focus on security servers. Sometimes plays at slot machine programming.
This entry was posted in coding theory. Bookmark the permalink.