On Sat, Mar 23, 2002 at 05:00:12PM -0800, Eric Young wrote:
> >>openSSL on a PIII-633Mhz can do 265 512 bit CRT RSA per
>
> I don't know what the OpenSSL people did to the x86 ASM code, but
> SSLeay (the precursor to OpenSSL, over 3 years old) did/does 330
> 512bit and 55 1024 bit RSAs a second
>
>
>Adam Back wrote:
>
>>openSSL on a PIII-633Mhz can do 265 512 bit CRT RSA per
>>second, or 50 1024 bit CRT RSA per second. So wether it will
>>even speed up current entry-level systems depends on the
>>correct interpretation of the product sheet.
>>
I don't know what the OpenSSL people
At 5:04 PM -0500 on 3/23/02, R. A. Hettinga wrote:
> During the internet stock bubble, his investors, self-described
> "Wave-oids", would haunt the investor web-chats and shout down anyone who
> talked about actual revenue as a "short" focused on the Next Big Thing in
> Entertainment Technology.
Adam Back wrote:
> openSSL on a PIII-633Mhz can do 265 512 bit CRT RSA per
> second, or 50 1024 bit CRT RSA per second. So wether it will
> even speed up current entry-level systems depends on the
> correct interpretation of the product sheet.
>
> And the economics of course depends on how
I was posing this question with some client based transaction system in
mind such as the proposed digital rights management (DRM) system, as
opposed to secure access to servers.
There are several companies that are touting that they have solutions for
DRM. Microsoft's story is that they have a se
On Fri, Mar 22, 2002 at 03:39:01PM +1100, Greg Rose wrote:
> But don't forget that your pentium can't do anything *else* while it's
> doing those RSAs... whereas the machine with the nForce can be actually
> servicing the requests.
While that is true, the issue is the economics; depending on th
Bearer Settlement List <[EMAIL PROTECTED]>,
[EMAIL PROTECTED]
Subject: Re: Secure peripheral cards
R. A. Hettinga wrote:
...
> I'm not sure NCipher gear is the #1 for acceleration, I think they're
> probably more focussed and used for secure key management. For
>
At 12:06 AM 3/22/2002 +, Adam Back wrote:
>I'm not sure NCipher gear is the #1 for acceleration, I think they're
>probably more focussed and used for secure key management. For
>example they quote [1] an nForce can do up to 400 new SSL connections
>per second. So that's CRT RSA, not sure if
On Thu, Mar 21, 2002 at 10:02:20AM -0500, R. A. Hettinga wrote:
> At 7:21 PM -0500 on 3/20/02, Roop Mukherjee wrote:
> > I am searching for some citable references about secure peripheral cards.
> > Contrary to what I had imagined when I had started searching, I found very
&
At 7:21 PM -0500 on 3/20/02, Roop Mukherjee wrote:
> I am searching for some citable references about secure peripheral cards.
> Contrary to what I had imagined when I had started searching, I found very
> little. I am looking to see what are the peripherals that have
> c
Roop Mukherjee <[EMAIL PROTECTED]> writes:
> I am searching for some citable references about secure peripheral > cards. ...
> I am looking to see what are the peripherals that have
> cryptographic capabilities and what are thier capabilities?
Intel and 3Com have ethernet
- Original Message -
From: "Roop Mukherjee" <[EMAIL PROTECTED]>
To: <[EMAIL PROTECTED]>
Sent: Thursday, 21 March, 2002 8:21 AM
Subject: Secure peripheral cards
> I am searching for some citable references about secure peripheral cards.
> Contrary to what I had
Well, there's always the IBM 4758, which we built as a general-purpose
secure computer environment for hostile environments, with the ability
for on-device applications to prove to the outside world what they are
and where they're running.
IBM's been marketing it primarily as a crypto accelerator
I am searching for some citable references about secure peripheral cards.
Contrary to what I had imagined when I had started searching, I found very
little. I am looking to see what are the peripherals that have
cryptographic capabilities and what are thier capabilities?
The Embassy
14 matches
Mail list logo