From owner-freebsd-chat Sat Mar 1 19:31:42 1997 Return-Path: Received: (from root@localhost) by freefall.freebsd.org (8.8.5/8.8.5) id TAA17736 for chat-outgoing; Sat, 1 Mar 1997 19:31:42 -0800 (PST) Received: from alpha.risc.org (taob@trt-on13-41.netcom.ca [207.181.84.169]) by freefall.freebsd.org (8.8.5/8.8.5) with ESMTP id TAA17721 for ; Sat, 1 Mar 1997 19:31:36 -0800 (PST) Received: from localhost (taob@localhost) by alpha.risc.org (8.8.4/8.8.4) with SMTP id WAA00470; Sat, 1 Mar 1997 22:29:34 -0500 (EST) Date: Sat, 1 Mar 1997 22:29:25 -0500 (EST) From: Brian Tao To: Amancio Hasty cc: "John S. Dyson" , FREEBSD-CHAT-L Subject: Re: RSA 56-bit key challenge In-Reply-To: <199703011941.LAA00321@rah.star-gate.com> Message-ID: MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII Sender: owner-chat@FreeBSD.ORG X-Loop: FreeBSD.org Precedence: bulk On Sat, 1 Mar 1997, Amancio Hasty wrote: > > I too will be running my client at nights . Right now I am tweaking my box 8) > rc5-56-client: Performance testing with 1000000 crypts > rc5-56-client: Complete in 2.838 seconds. (352389.25 keys/sec) Hmmmm... think it would be possible to squeeze 400000 keys/sec out of an Intel CPU? :) -- Brian Tao (BT300, taob@risc.org) "Though this be madness, yet there is method in't"