Date: Fri, 28 Feb 1997 23:34:40 -0500 (EST) From: Brian Tao <taob@risc.org> To: "Kenneth D. Merry" <ken@r74h25.res.gatech.edu> Cc: Amancio Hasty <hasty@rah.star-gate.com>, FREEBSD-CHAT-L <freebsd-chat@freebsd.org> Subject: Re: RSA 56-bit key challenge Message-ID: <Pine.BSF.3.95.970228231917.7982E-100000@alpha.risc.org> In-Reply-To: <199703010400.XAA01541@r74h25.res.gatech.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
On Fri, 28 Feb 1997, Kenneth D. Merry wrote: > > I think that is correct. Here's what I got, dual PPRO 200, 256K > cache. (so I assume I could get about twice this if I ran two > copies) Yes, it seems to scale quite linearly with the number of CPU's. csm@sgi.com is running an SGI Origin2000 with 128 CPU's and 2GB of RAM. He's benchmarked it at over 20 million keys/sec, but he can't dedicate the whole machine to it (luckily for the rest of us ;-)). > {r74h118:/usr/home/ken/dl:23:0} uname -a > FreeBSD r74h118.res.gatech.edu 3.0-SMP FreeBSD 3.0-SMP #0: Mon Jan 27 01:27:38 EST 1997 ken@r74h118.res.gatech.edu:/usr/src/sys-SMP/compile/panzer i386 > {r74h118:/usr/home/ken/dl:24:0} ./rc5-client-freebsd -m > rc5-56-client: Performance testing with 1000000 crypts > rc5-56-client: Complete in 3.300 seconds. (303063.36 keys/sec) Well... I guess I'll make this an open invite: anyone not already affiliated with a team is more than welcome to join our little grassroots effort at rsacrack@vex.net (http://www.vex.net/~rasmus/rsa/). We've got everything from PPro200's down to a wee Sun 3/60 that takes almost 2 days to complete a single keyblock, and we don't favour one particular OS over another. :) -- Brian Tao (BT300, taob@risc.org) "Though this be madness, yet there is method in't"
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?Pine.BSF.3.95.970228231917.7982E-100000>