libgcrypt 1.1.93 released

Christian Grothoff grothoff at cs.purdue.edu
Tue Mar 9 11:05:53 CET 2004


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Tuesday 09 March 2004 10:36 am, you wrote:
> On Tue, 9 Mar 2004 09:53:48 -0500, Christian Grothoff said:
> > I just wanted to throw in another reason why I like Nikos suggestion to
> > add a handle for the PRNG.  I would like to be able to pass my own PRNG
> > to the (RSA) key generation.  Now, I don't know if that's currently
> > possible (didn't
>
> I guess what you really want is a faster key generation and not a
> different RNG ;-).

Actually, no.  I'm not talking about the PRNG sparc bugs here.  I need to 
generate an RSA key deterministically (!) from a hash-code.  Read: the hash 
code is the only source of random bits allowed.  This is not the usual 
SSL-style use of RSA in GNUnet and not even a digital signature.  It's more 
like a new cryptographic primitive that we've proposed in our research (see 
http://www.ovmj.org/GNUnet/ecrs.ps, look for KBlocks).  It has nothing to do 
with speed.

> BTW, any idea how we can track why the performance on sparc64 is that
> bad?  I have the hunch that this is due to a bad alignment and
> emulation in the kernel.

Actually, I have no clue other than that I seriously doubt that it is an 
alignment problem since the CPU load is rather low.  The code seems to be 
blocking for extended periods of time reading from /dev/?random.  But again, 
the sparc64 problem is entirely orthogonal to the PRNG issue.

Christian
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)

iD8DBQFATeth9tNtMeXQLkIRAi7IAJ9Y0EDDoGdC0P2w/F1SNsmdiGJAWACfd+r7
JVaEYzQQt3m4noncPg226OY=
=NM+5
-----END PGP SIGNATURE-----



More information about the Gcrypt-devel mailing list