Re: Crypto friendly optimization?

Ian Lance Taylor <ianlancetaylor@gmail.com>
Sat, 24 Aug 2024 20:14:50 -0700

          From comp.compilers

Related articles
Crypto friendly optimization? johnl@taugh.com (John R Levine) (2024-08-24)
Re: Crypto friendly optimization? Keith.S.Thompson+u@gmail.com (Keith Thompson) (2024-08-24)
Re: Crypto friendly optimization? ianlancetaylor@gmail.com (Ian Lance Taylor) (2024-08-24)
Re: Crypto friendly optimization? Keith.S.Thompson+u@gmail.com (Keith Thompson) (2024-08-24)
Re: Crypto friendly optimization? david.brown@hesbynett.no (David Brown) (2024-08-25)
Re: Crypto friendly optimization? anton@mips.complang.tuwien.ac.at (2024-08-25)
Re: Crypto friendly optimization? david.brown@hesbynett.no (David Brown) (2024-08-25)
| List of all articles for this month |
From: Ian Lance Taylor <ianlancetaylor@gmail.com>
Newsgroups: comp.compilers
Date: Sat, 24 Aug 2024 20:14:50 -0700
Organization: Compilers Central
References: 24-08-003
Injection-Info: gal.iecc.com; posting-host="news.iecc.com:2001:470:1f07:1126:0:676f:7373:6970"; logging-data="40818"; mail-complaints-to="abuse@iecc.com"
Keywords: optimize
Posted-Date: 24 Aug 2024 23:25:54 EDT
In-Reply-To: 24-08-003

For the Go programming language there has been discussion of adding a
secret.Do function, that invokes a function closure and, after it returns,
erases all memory that it allocated. The goal is better, though not perfect,
forward secrecy, so that people can't capture a key today and a conversation
today and, if they key becomes vulnerable, later use it to decrypt the
conversation. There is a lot of discussion at <https://go.dev/issue/21865>
with the output at
<https://github.com/golang/go/issues/21865#issuecomment-925310304>. This is
not yet implemented, but the current attempts require work in both the
compiler and the runtime library.


Related to that is a more speculative idea to enable ARM DIT/Intel DOIT mode
while executing a function. Discussion at <https://go.dev/issue/66450>.


But there is no special work in the Go compilers to ensure that code written
to execute in constant-time is not optimized to run in non-constant-time. It
would be interesting to hear about other work in that area.




Ian


Post a followup to this message

Return to the comp.compilers page.
Search the comp.compilers archives again.