Date: Mon, 26 Jan 2004 13:55:59 -0500 From: Mike Tancsa <mike@sentex.net> To: Rumen Telbizov <altares@e-card.bg>, Charles Swiger <cswiger@mac.com> Cc: stable@freebsd.org Subject: Re: FreeBSD + Rainbow Cryptoswift Message-ID: <6.0.1.1.0.20040126133802.07bb2060@209.112.4.2> In-Reply-To: <20040126164948.GD230@e-card.bg> References: <20040126091424.GI688@e-card.bg> <6889E365-5016-11D8-B821-003065A20588@mac.com> <20040126155600.GB230@e-card.bg> <EFEE6595-501C-11D8-B821-003065A20588@mac.com> <20040126164948.GD230@e-card.bg>
next in thread | previous in thread | raw e-mail | index | archive | help
The only transformations supported by the hifn card are whats stated in the man page, to quote, "The hifn driver registers itself to accelerate DES, Triple-DES, AES (7955 and 7956 only), ARC4, MD5, MD5-HMAC, SHA1, and SHA1-HMAC operations for ipsec(4) and crypto(4)." For my applications, this is adequate. ---Mike At 11:49 AM 26/01/2004, Rumen Telbizov wrote: >On Mon, Jan 26, 2004 at 11:30:22AM -0500, Charles Swiger wrote: > > On Jan 26, 2004, at 10:56 AM, Rumen Telbizov wrote: > > [ ... ] > > >I don't see anything related to RSA computations?! > > >Do you see any real acceleration in the RSA operations > > >while using this card or there is NO support for RSA in > > >the crypto device ? > > > > It might be worth asking the author of cryptodev and hifn whether the > > manpage is current with regard to RSA support. For my purposes, adding > > entropy and speeding up 3DES for ssh is useful, but you are right that > > HTTPS acceleration will want RSA. > > > > The hifn cards will do ARC4/MD5/SHA, which is still helpful to your > > situation, but doing SSL session startup with a 1024-bit RSA server > > certificate tends to be the hit that slows down a busy site, not > > streaming 40/128-bit encryption afterwards. > > > > Here's the results of an "openssl speed" on a machine with a 933MHz > > Tualatin: > >Well I my case the traffic that I will transfer will be very low. >The highest load is going to be in the authentication (client >based certificates) which is RSA public/private keys computations. >So the symetric cryptography is not a big interest. >As it is well known the public key encryption is not a big problem >since the public exponent is chosen to be one of the 3,17,65537 primes. >The slowdown is in the private key operations - they are very SLOW! >In this test the key column is SIGN - because then we have private key used! > >Here are my results on a Celeron 1700 of the RSA: >rsa 2048 bits 0.1024s 0.0030s 9.8 336.4 > >compared to yours: > > rsa 2048 bits 0.0959s 0.0029s 10.4 346.7 > >10.4(you) against 9.8(me) is not that much taking into account >that you have a crypto-card (which one did you use to make this test?) > >This makes me think that it might be worth buying more powerfull >processors than buying a crypto-card. > >Thank you for your test. > >Rumen Telbizov >_______________________________________________ >freebsd-stable@freebsd.org mailing list >http://lists.freebsd.org/mailman/listinfo/freebsd-stable >To unsubscribe, send any mail to "freebsd-stable-unsubscribe@freebsd.org"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?6.0.1.1.0.20040126133802.07bb2060>