mersenneforum.org  

Go Back   mersenneforum.org > Great Internet Mersenne Prime Search > Hardware > GPU Computing

Reply
 
Thread Tools
Old 2011-08-21, 17:36   #12
CRGreathouse
 
CRGreathouse's Avatar
 
Aug 2006

598810 Posts
Default

Quote:
Originally Posted by jasong View Post
I suppose it's possible the government changed it's mind, which would explain why B2 released the data after months of protest. Note that that's plenty of time for the government to change their codes away from anything having to do with Riesel numbers.
The US government codes are not, and have never been, based on the factorization of Riesel numbers. Maybe you can even figure out why. (Hint: entropy.)

Personally, I'd like to think that the high-level codes are based on the codes outlined in Bernstein's 2009 book. But alas, that's not so, at least through Top Secret for which the use of AES-192 or AES-256 is sufficient:
http://csrc.nist.gov/groups/ST/toolk...k_ciphers.html

Of course AES is symmetric so not really threatened by quantum methods AFAIK.
CRGreathouse is offline   Reply With Quote
Old 2011-08-21, 18:27   #13
mdettweiler
A Sunny Moo
 
mdettweiler's Avatar
 
Aug 2007
USA

2·47·67 Posts
Default

@jasong: FYI, there has been some work already put into a CUDA-based LLR program here on this forum. See this thread for more details. It's currently in a sort of alpha/beta stage, and can be faster than a modern CPU depending on the size of the numbers being tested. (GPUs, apparently, do much better on large numbers than small, because they parallelize better or something like that; the aforementioned llrCUDA program can do about twice the speed of one CPU core at n=1.3M or so, and four or eight times faster at n=20M, if I remember correctly.)
mdettweiler is offline   Reply With Quote
Old 2011-08-22, 00:46   #14
jasong
 
jasong's Avatar
 
"Jason Goatcher"
Mar 2005

3·7·167 Posts
Default

Quote:
Originally Posted by CRGreathouse View Post
The US government codes are not, and have never been, based on the factorization of Riesel numbers. Maybe you can even figure out why. (Hint: entropy.)

Personally, I'd like to think that the high-level codes are based on the codes outlined in Bernstein's 2009 book. But alas, that's not so, at least through Top Secret for which the use of AES-192 or AES-256 is sufficient:
http://csrc.nist.gov/groups/ST/toolk...k_ciphers.html

Of course AES is symmetric so not really threatened by quantum methods AFAIK.
I never said they were based on Riesel numbers.
jasong is offline   Reply With Quote
Old 2011-08-22, 00:50   #15
jasong
 
jasong's Avatar
 
"Jason Goatcher"
Mar 2005

1101101100112 Posts
Default

Quote:
Originally Posted by mdettweiler View Post
@jasong: FYI, there has been some work already put into a CUDA-based LLR program here on this forum. See this thread for more details. It's currently in a sort of alpha/beta stage, and can be faster than a modern CPU depending on the size of the numbers being tested. (GPUs, apparently, do much better on large numbers than small, because they parallelize better or something like that; the aforementioned llrCUDA program can do about twice the speed of one CPU core at n=1.3M or so, and four or eight times faster at n=20M, if I remember correctly.)
Well, then, that's awesome. Last time I read up on that there was a bunch of jabbering about graphics cards not being able to deal with real(as opposed to integer-based) numbers. Bugged the shizzle out of me, since the FFT is obviously 100% integer-based. But if that's out-dated info, then I apologize for starting the thread.
jasong is offline   Reply With Quote
Old 2011-08-22, 03:36   #16
Christenson
 
Christenson's Avatar
 
Dec 2010
Monticello

111000000112 Posts
Default

Quote:
Originally Posted by jasong View Post
Well, then, that's awesome. Last time I read up on that there was a bunch of jabbering about graphics cards not being able to deal with real(as opposed to integer-based) numbers. Bugged the shizzle out of me, since the FFT is obviously 100% integer-based. But if that's out-dated info, then I apologize for starting the thread.
Hi Jason:
The $500 hardware is a high-end NVIDIA-brand GPU. It runs CUDA. AMD has a competitive offering, OpenCL, for their hardware, but mfakto (as opposed to mfaktc) is about a year behind, due to a failure on the part of AMD to deal with the need for locks/semaphores/serialisation in concurrent computing systems.

CUDAlucas runs the LL tests.

And for TF, GPUs run circles around CPUs...50GHz days/day is what I get for a GTX440, which is all the power supply on my six-core box will support.

And yes, some public-key codes do rely on the difficulty of factoring large composite numbers with just two large factors....so a delay and slight re-direction of certain projects may have helped protect certain codes, particularly RSA-768. As an example of this sort of thing, some time this year, someone on mersenneforum asked for the factors of a random large number, and disappeared when we asked where they got it from.

And as for the real/integer debate...both have their places, P95 just wants as many bits as he can get....as the LL test run-time is about 95% FFTs.
Christenson is offline   Reply With Quote
Old 2011-08-22, 07:26   #17
Christenson
 
Christenson's Avatar
 
Dec 2010
Monticello

5·359 Posts
Default

Jason,
If you want to contribute, there are two aspects of mfaktc that are a bit of a problem.

The first is the tasking model. That is, suppose we have several processes, all under the same user, one mfaktc, the other CUDALucas, making calls to the GPU, simultaneously. The GPU can't do all of them at the same time...so how do things get scheduled?

The second is Reisel numbers...one of the more respected prime hunters asked if we could re-target numbers of a slightly different form with mfaktc. It's a straightforward extension, but I haven't had time to get into the math to do it.

I'm personally working on automating mfaktc by taking a bunch of code from P95. It's going slowly, but it is going. Once what I am doing is done, you may want to take the technique and apply it to CUDALucas...development there is primarily focussed on algorithms at the moment.

Don't forget to polish your code...a few nuts like myself are going to audit it closely.

Eric C.
Christenson is offline   Reply With Quote
Old 2011-08-22, 13:50   #18
xilman
Bamboozled!
 
xilman's Avatar
 
"๐’‰บ๐’ŒŒ๐’‡ท๐’†ท๐’€ญ"
May 2003
Down not across

2E1616 Posts
Default

Quote:
Originally Posted by jasong View Post
You might think it's extremely funny, but government encryption is based on prime numbers, so there's always the possibility of invading territory that affects government security. Think about it, supercomputers are based on off-the-shelf parts and the BOINC collection could easily fit in the top-20 of supercomputers if people wanted to treat it that way.
I for one find it somewhat (but not extremely) funny.

A tiny amount of "government encryption" may be based on prime numbers but the vast majority is not. I know that sounds like an unsupported pronouncement but

(a) a goodly number of governmental crypto requirements are well specified in publicly visible documents;

(b) there is a large number of people working and publishing in the unclassified world, some of them contributing here, who would agree that my statement is largely true;

(c) there is a smaller number of people with security clearance from their governments who know at least something about the classified world but it's likely that although I believe they would agree with me, it's unlikely they would confirm it in anything but the most ambiguous manner. I know that at least two people posting on the forum have or have had such clearance from their respective government(s) but I have no real idea what they are / have been working on nor whether they can comment on my assertion --- though I expect not and have no intention of asking them outright.

(d) those paying attention to the open literature have a very good grasp on what is currently possible, near-term feasible and long-term infeasible when attacking encryption "based on prime numbers". Do you really believe that the government agencies haven't been paying attention to what the rest of the world have been doing openly and have not been planning ahead? If so, why did kilobit RSA, for example, reach the end of its recommended life last year?

Paul

Last fiddled with by xilman on 2011-08-22 at 20:01 Reason: Re-insert unfortunate deletion
xilman is offline   Reply With Quote
Old 2011-08-22, 19:02   #19
bsquared
 
bsquared's Avatar
 
"Ben"
Feb 2007

1110101101012 Posts
Default

Quote:
Originally Posted by CRGreathouse View Post
Of course AES is symmetric so not really threatened by quantum methods AFAIK.
There's this work from 2000. Also, the topic was recently discussed in the comments section of Schneier's blog in a post discussing a new (theoretical) attack on AES.
bsquared is offline   Reply With Quote
Old 2011-08-23, 03:32   #20
LaurV
Romulan Interpreter
 
LaurV's Avatar
 
"name field"
Jun 2011
Thailand

41×251 Posts
Default

About NIST approvals of encryption algorithms (approximate quotation from my memory):

"It is quite funny when my students come to me with new encryption algorithms, claiming they are impossible to decrypt, and they were approved by US government. I usually ask them 'Approved for what?'. For export? Usually we never approve for export, or standardize, something we can not decrypt." - Fred Cohen.

(that is the same Fred Cohen who is the father of computer viruses, my thesis was about computer viruses and cryptology, but that was 25 years ago)

Last fiddled with by LaurV on 2011-08-23 at 03:36
LaurV is offline   Reply With Quote
Reply



Similar Threads
Thread Thread Starter Forum Replies Last Post
So you think you can program rogue Lounge 5 2009-10-02 15:02
Program Primeinator Information & Answers 5 2009-07-16 21:42
Program for GPU tribal Information & Answers 5 2009-03-19 20:54
Old Program moo Software 0 2006-06-27 00:19
which program? drakkar67 Prime Sierpinski Project 14 2005-11-29 06:25

All times are UTC. The time now is 15:09.


Fri Jul 7 15:09:02 UTC 2023 up 323 days, 12:37, 0 users, load averages: 1.20, 1.17, 1.15

Powered by vBulletin® Version 3.8.11
Copyright ©2000 - 2023, Jelsoft Enterprises Ltd.

This forum has received and complied with 0 (zero) government requests for information.

Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation.
A copy of the license is included in the FAQ.

โ‰  ยฑ โˆ“ รท ร— ยท โˆ’ โˆš โ€ฐ โŠ— โŠ• โŠ– โŠ˜ โŠ™ โ‰ค โ‰ฅ โ‰ฆ โ‰ง โ‰จ โ‰ฉ โ‰บ โ‰ป โ‰ผ โ‰ฝ โŠ โА โŠ‘ โŠ’ ยฒ ยณ ยฐ
โˆ  โˆŸ ยฐ โ‰… ~ โ€– โŸ‚ โซ›
โ‰ก โ‰œ โ‰ˆ โˆ โˆž โ‰ช โ‰ซ โŒŠโŒ‹ โŒˆโŒ‰ โˆ˜ โˆ โˆ โˆ‘ โˆง โˆจ โˆฉ โˆช โจ€ โŠ• โŠ— ๐–• ๐–– ๐–— โŠฒ โŠณ
โˆ… โˆ– โˆ โ†ฆ โ†ฃ โˆฉ โˆช โІ โŠ‚ โŠ„ โŠŠ โЇ โŠƒ โŠ… โŠ‹ โŠ– โˆˆ โˆ‰ โˆ‹ โˆŒ โ„• โ„ค โ„š โ„ โ„‚ โ„ต โ„ถ โ„ท โ„ธ ๐“Ÿ
ยฌ โˆจ โˆง โŠ• โ†’ โ† โ‡’ โ‡ โ‡” โˆ€ โˆƒ โˆ„ โˆด โˆต โŠค โŠฅ โŠข โŠจ โซค โŠฃ โ€ฆ โ‹ฏ โ‹ฎ โ‹ฐ โ‹ฑ
โˆซ โˆฌ โˆญ โˆฎ โˆฏ โˆฐ โˆ‡ โˆ† ฮด โˆ‚ โ„ฑ โ„’ โ„“
๐›ข๐›ผ ๐›ฃ๐›ฝ ๐›ค๐›พ ๐›ฅ๐›ฟ ๐›ฆ๐œ€๐œ– ๐›ง๐œ ๐›จ๐œ‚ ๐›ฉ๐œƒ๐œ— ๐›ช๐œ„ ๐›ซ๐œ… ๐›ฌ๐œ† ๐›ญ๐œ‡ ๐›ฎ๐œˆ ๐›ฏ๐œ‰ ๐›ฐ๐œŠ ๐›ฑ๐œ‹ ๐›ฒ๐œŒ ๐›ด๐œŽ๐œ ๐›ต๐œ ๐›ถ๐œ ๐›ท๐œ™๐œ‘ ๐›ธ๐œ’ ๐›น๐œ“ ๐›บ๐œ”