libgcrypt 1.1.93 released
    Christian Grothoff 
    grothoff at cs.purdue.edu
       
    Tue Mar  9 11:05:53 CET 2004
    
    
  
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Tuesday 09 March 2004 10:36 am, you wrote:
> On Tue, 9 Mar 2004 09:53:48 -0500, Christian Grothoff said:
> > I just wanted to throw in another reason why I like Nikos suggestion to
> > add a handle for the PRNG.  I would like to be able to pass my own PRNG
> > to the (RSA) key generation.  Now, I don't know if that's currently
> > possible (didn't
>
> I guess what you really want is a faster key generation and not a
> different RNG ;-).
Actually, no.  I'm not talking about the PRNG sparc bugs here.  I need to 
generate an RSA key deterministically (!) from a hash-code.  Read: the hash 
code is the only source of random bits allowed.  This is not the usual 
SSL-style use of RSA in GNUnet and not even a digital signature.  It's more 
like a new cryptographic primitive that we've proposed in our research (see 
http://www.ovmj.org/GNUnet/ecrs.ps, look for KBlocks).  It has nothing to do 
with speed.
> BTW, any idea how we can track why the performance on sparc64 is that
> bad?  I have the hunch that this is due to a bad alignment and
> emulation in the kernel.
Actually, I have no clue other than that I seriously doubt that it is an 
alignment problem since the CPU load is rather low.  The code seems to be 
blocking for extended periods of time reading from /dev/?random.  But again, 
the sparc64 problem is entirely orthogonal to the PRNG issue.
Christian
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.0.7 (GNU/Linux)
iD8DBQFATeth9tNtMeXQLkIRAi7IAJ9Y0EDDoGdC0P2w/F1SNsmdiGJAWACfd+r7
JVaEYzQQt3m4noncPg226OY=
=NM+5
-----END PGP SIGNATURE-----
    
    
More information about the Gcrypt-devel
mailing list