Date: Fri, 28 Feb 1997 23:34:40 -0500 (EST) From: Brian Tao <taob@risc.org> To: "Kenneth D. Merry" <ken@r74h25.res.gatech.edu> Cc: Amancio Hasty <hasty@rah.star-gate.com>, FREEBSD-CHAT-L <freebsd-chat@freebsd.org> Subject: Re: RSA 56-bit key challenge Message-ID: <Pine.BSF.3.95.970228231917.7982E-100000@alpha.risc.org> In-Reply-To: <199703010400.XAA01541@r74h25.res.gatech.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 28 Feb 1997, Kenneth D. Merry wrote:
>
> I think that is correct. Here's what I got, dual PPRO 200, 256K
> cache. (so I assume I could get about twice this if I ran two
> copies)
Yes, it seems to scale quite linearly with the number of CPU's.
csm@sgi.com is running an SGI Origin2000 with 128 CPU's and 2GB of
RAM. He's benchmarked it at over 20 million keys/sec, but he can't
dedicate the whole machine to it (luckily for the rest of us ;-)).
> {r74h118:/usr/home/ken/dl:23:0} uname -a
> FreeBSD r74h118.res.gatech.edu 3.0-SMP FreeBSD 3.0-SMP #0: Mon Jan 27 01:27:38 EST 1997 ken@r74h118.res.gatech.edu:/usr/src/sys-SMP/compile/panzer i386
> {r74h118:/usr/home/ken/dl:24:0} ./rc5-client-freebsd -m
> rc5-56-client: Performance testing with 1000000 crypts
> rc5-56-client: Complete in 3.300 seconds. (303063.36 keys/sec)
Well... I guess I'll make this an open invite: anyone not already
affiliated with a team is more than welcome to join our little
grassroots effort at rsacrack@vex.net (http://www.vex.net/~rasmus/rsa/).
We've got everything from PPro200's down to a wee Sun 3/60 that takes
almost 2 days to complete a single keyblock, and we don't favour one
particular OS over another. :)
--
Brian Tao (BT300, taob@risc.org)
"Though this be madness, yet there is method in't"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.95.970228231917.7982E-100000>
