Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 07 Jun 2000 08:11:46 +0200
From:      Mark Murray <mark@grondar.za>
To:        Dan Moschuk <dan@FreeBSD.org>
Cc:        "Jeroen C. van Gelderen" <jeroen@vangelderen.org>, arch@FreeBSD.org, phk@FreeBSD.org
Subject:   Re: (2nd iteration) New /dev/(random|null|zero) - review, please 
Message-ID:  <200006070611.IAA24440@gratis.grondar.za>
In-Reply-To: <20000606170336.D3351@spirit.jaded.net> ; from Dan Moschuk <dan@FreeBSD.org>  "Tue, 06 Jun 2000 17:03:36 -0400."
References:  <20000606170336.D3351@spirit.jaded.net> 

next in thread | previous in thread | raw e-mail | index | archive | help
> | Yarrow -when finished- is not noticably slower than our current
> | implementation of /dev/[u]random. Yarrow does one block encryption
> | for every output block and a generator gate every 10 blocks. This
> | would allow for at least 40 mbit/s output on a 200 Mhz PPro when 
> | using Rijndael/256/256.
> 
> It was my understanding that we weren't using Rijndael/256 yet.  Is this
> going to change?

The original plan was for SHA1/DES3; I am listening to counter-arguments.
I may use Rijndael; I may use Blowfish.

M
--
Mark Murray
Join the anti-SPAM movement: http://www.cauce.org


To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-arch" in the body of the message




Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?200006070611.IAA24440>