libgcrypt 1.1.93 released
Christian Grothoff
grothoff at cs.purdue.edu
Tue Mar 9 11:05:53 CET 2004
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Tuesday 09 March 2004 10:36 am, you wrote:
> On Tue, 9 Mar 2004 09:53:48 -0500, Christian Grothoff said:
> > I just wanted to throw in another reason why I like Nikos suggestion to
> > add a handle for the PRNG. I would like to be able to pass my own PRNG
> > to the (RSA) key generation. Now, I don't know if that's currently
> > possible (didn't
>
> I guess what you really want is a faster key generation and not a
> different RNG ;-).
Actually, no. I'm not talking about the PRNG sparc bugs here. I need to
generate an RSA key deterministically (!) from a hash-code. Read: the hash
code is the only source of random bits allowed. This is not the usual
SSL-style use of RSA in GNUnet and not even a digital signature. It's more
like a new cryptographic primitive that we've proposed in our research (see
http://www.ovmj.org/GNUnet/ecrs.ps, look for KBlocks). It has nothing to do
with speed.
> BTW, any idea how we can track why the performance on sparc64 is that
> bad? I have the hunch that this is due to a bad alignment and
> emulation in the kernel.
Actually, I have no clue other than that I seriously doubt that it is an
alignment problem since the CPU load is rather low. The code seems to be
blocking for extended periods of time reading from /dev/?random. But again,
the sparc64 problem is entirely orthogonal to the PRNG issue.
Christian
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQFATeth9tNtMeXQLkIRAi7IAJ9Y0EDDoGdC0P2w/F1SNsmdiGJAWACfd+r7
JVaEYzQQt3m4noncPg226OY=
=NM+5
-----END PGP SIGNATURE-----
More information about the Gcrypt-devel
mailing list