possible mpi-pow improvement
Werner Koch
wk at gnupg.org
Tue Oct 15 15:49:44 CEST 2013
On Wed, 2 Oct 2013 02:41, gniibe at fsij.org said:
> Yes, at least on machine.
And on mine ;-)/
Before:
Algorithm generate 100*sign 100*verify
------------------------------------------------
RSA 1024 bit 20ms 120ms 10ms
RSA 2048 bit 120ms 630ms 10ms
RSA 3072 bit 450ms 1780ms 10ms
RSA 4096 bit 4110ms 3700ms 30ms
DSA 1024/160 - 60ms 60ms
DSA 2048/224 - 210ms 200ms
DSA 3072/256 - 470ms 440ms
After:
Algorithm generate 100*sign 100*verify
------------------------------------------------
RSA 1024 bit 10ms 80ms 0ms
RSA 2048 bit 60ms 370ms 10ms
RSA 3072 bit 1710ms 1060ms 10ms
RSA 4096 bit 1310ms 2220ms 20ms
DSA 1024/160 - 40ms 60ms
DSA 2048/224 - 140ms 200ms
DSA 3072/256 - 300ms 430ms
> With compilation option -DUSE_ALGORITHM_SIMPLE_EXPONENTIATION, we can
> use old implementation.
>
> Please test it out.
Please push your patch to master.
Salam-Shalom,
Werner
--
Die Gedanken sind frei. Ausnahmen regelt ein Bundesgesetz.
More information about the Gcrypt-devel
mailing list