--- begin forwarded text
Status: U Date: Fri, 22 Mar 2002 09:00:58 +0000 From: Nicko van Someren <[EMAIL PROTECTED]> User-Agent: Mozilla/5.0 (Macintosh; U; PPC Mac OS X; en-US; rv:0.9.4) Gecko/20011126 Netscape6/6.2.1 To: "R. A. Hettinga" <[EMAIL PROTECTED]> CC: Digital Bearer Settlement List <[EMAIL PROTECTED]>, [EMAIL PROTECTED] Subject: Re: Secure peripheral cards R. A. Hettinga wrote: ... > I'm not sure NCipher gear is the #1 for acceleration, I think they're > probably more focussed and used for secure key management. For > example they quote [1] an nForce can do up to 400 new SSL connections > per second. So that's CRT RSA, not sure if 1024 bit or 512 bit (it > does say "up to"). openSSL on a PIII-633Mhz can do 265 512 bit CRT > RSA per second, or 50 1024 bit CRT RSA per second. So wether it will > even speed up current entry-level systems depends on the correct > interpretation of the product sheet. ... > [1] http://www.ncipher.com/products/rscs/datasheets/nFast.pdf While you are right that we focus these days on the key management side I would like to say that now, as ever, the speeds we quote are for 1024 bit RSA decryptions, not 512 bit. Incedentally the data sheet that you reference clearly states that the nFast800 handles "Up to 800 RSA SSL handshakes per second (1024-bit RSA decryptions)". Nicko --- end forwarded text -- ----------------- R. A. Hettinga <mailto: [EMAIL PROTECTED]> The Internet Bearer Underwriting Corporation <http://www.ibuc.com/> 44 Farquhar Street, Boston, MA 02131 USA "... however it may deserve respect for its usefulness and antiquity, [predicting the end of the world] has not been found agreeable to experience." -- Edward Gibbon, 'Decline and Fall of the Roman Empire' --------------------------------------------------------------------- The Cryptography Mailing List Unsubscribe by sending "unsubscribe cryptography" to [EMAIL PROTECTED]