[Cryptech Tech] Tor consensus use case
Joachim Strömbergson
joachim at secworks.se
Thu Jan 29 13:58:14 UTC 2015
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256
Aloha!
Linus Nordberg wrote:
> Depending on the interface to this thing, the requirements might be
> a bit tighter than that. Just to be overly clear, blocking for "a
> long time" on sign and verify operations will induce sadness.
So what would be happy response times?
Based on what I can see from core vendors for FPGAs, I think that we
should be able to do a RSA-2048 operation in something like 300 ms, or
even faster than that. A guesstimate for RSA-4096 is around a second.
There seems to be few cores that supports keys beyond 2048 bits.
Thanks for helping out defining use case requirements.
- --
Med vänlig hälsning, Yours
Joachim Strömbergson - Alltid i harmonisk svängning.
========================================================================
Joachim Strömbergson Secworks AB joachim at secworks.se
========================================================================
-----BEGIN PGP SIGNATURE-----
Version: GnuPG/MacGPG2 v2
Comment: GPGTools - http://gpgtools.org
Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/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=TNyQ
-----END PGP SIGNATURE-----
More information about the Tech
mailing list