Skip site navigation (1)Skip section navigation (2)
Date:      Fri, 28 Feb 1997 23:34:40 -0500 (EST)
From:      Brian Tao <taob@risc.org>
To:        "Kenneth D. Merry" <ken@r74h25.res.gatech.edu>
Cc:        Amancio Hasty <hasty@rah.star-gate.com>, FREEBSD-CHAT-L <freebsd-chat@freebsd.org>
Subject:   Re: RSA 56-bit key challenge
Message-ID:  <Pine.BSF.3.95.970228231917.7982E-100000@alpha.risc.org>
In-Reply-To: <199703010400.XAA01541@r74h25.res.gatech.edu>

next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 28 Feb 1997, Kenneth D. Merry wrote:
> 
> I think that is correct.  Here's what I got, dual PPRO 200, 256K
> cache.  (so I assume I could get about twice this if I ran two
> copies)

    Yes, it seems to scale quite linearly with the number of CPU's.
csm@sgi.com is running an SGI Origin2000 with 128 CPU's and 2GB of
RAM.  He's benchmarked it at over 20 million keys/sec, but he can't
dedicate the whole machine to it (luckily for the rest of us ;-)).

> {r74h118:/usr/home/ken/dl:23:0} uname -a
> FreeBSD r74h118.res.gatech.edu 3.0-SMP FreeBSD 3.0-SMP #0: Mon Jan 27 01:27:38 EST 1997 ken@r74h118.res.gatech.edu:/usr/src/sys-SMP/compile/panzer  i386
> {r74h118:/usr/home/ken/dl:24:0} ./rc5-client-freebsd -m
> rc5-56-client: Performance testing with 1000000 crypts
> rc5-56-client: Complete in 3.300 seconds. (303063.36 keys/sec)

    Well... I guess I'll make this an open invite:  anyone not already
affiliated with a team is more than welcome to join our little
grassroots effort at rsacrack@vex.net (http://www.vex.net/~rasmus/rsa/).
We've got everything from PPro200's down to a wee Sun 3/60 that takes
almost 2 days to complete a single keyblock, and we don't favour one
particular OS over another.  :)
--
Brian Tao (BT300, taob@risc.org)
"Though this be madness, yet there is method in't"





Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.95.970228231917.7982E-100000>