possible mpi-pow improvement

Werner Koch wk at gnupg.org
Tue Oct 15 15:49:44 CEST 2013


On Wed,  2 Oct 2013 02:41, gniibe at fsij.org said:

> Yes, at least on machine.

And on mine ;-)/

Before:

Algorithm         generate  100*sign  100*verify
------------------------------------------------
RSA 1024 bit          20ms     120ms        10ms
RSA 2048 bit         120ms     630ms        10ms
RSA 3072 bit         450ms    1780ms        10ms
RSA 4096 bit        4110ms    3700ms        30ms
DSA 1024/160             -      60ms        60ms
DSA 2048/224             -     210ms       200ms
DSA 3072/256             -     470ms       440ms

After:

Algorithm         generate  100*sign  100*verify
------------------------------------------------
RSA 1024 bit          10ms      80ms         0ms
RSA 2048 bit          60ms     370ms        10ms
RSA 3072 bit        1710ms    1060ms        10ms
RSA 4096 bit        1310ms    2220ms        20ms
DSA 1024/160             -      40ms        60ms
DSA 2048/224             -     140ms       200ms
DSA 3072/256             -     300ms       430ms


> With compilation option -DUSE_ALGORITHM_SIMPLE_EXPONENTIATION, we can
> use old implementation.
>
> Please test it out.

Please push your patch to master.


Salam-Shalom,

   Werner

-- 
Die Gedanken sind frei.  Ausnahmen regelt ein Bundesgesetz.




More information about the Gcrypt-devel mailing list