Solved

MIPS for different key lengths

Posted on 2004-05-02
2
177 Views
Last Modified: 2010-04-11
Hello,
can somebody tell me how to compute the time that a 1 GHz processor needs to decrypt a 32 bit length key? (Assuming that one key per cycle is checked) Any hints are welcome!
Thanks in advance...
0
Comment
Question by:zaratin
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 1

Accepted Solution

by:
cfjr earned 250 total points
ID: 10997182
It all depends on they type of encryption you are using.  Some are more expensive than others.

You best bet is to write a sript that encypts and decrypts using the encyption algorthm you plan to use, and timestamp each step.

You also needs to include the time it takes to look up the public/private key, and if you want to check they key against a CRL (Certificate revocation).

You should really avoid the time question and focus on throughput (meg per sec).
You will be bound by:
  *Type of OS and Version
   *Encyption/Decription you are using
   *Key lookup time
   *How often you check against the CRL (per transaction, or are you checking when the transfer stream is started).
   *key length
   *Encryption - SSL, PGP, DES, etc.

You will get diffent answers for Linux, Solaris, Windows Xp Server, Windows Xp professional, Xp Home edition, etc.

There is an intersting thread at http://www.uwsg.iu.edu/hypermail/linux/kernel/0307.0/0965.html where someone did some testing with Linux.


0

Featured Post

Free NetCrunch network monitor licenses!

Only on Experts-Exchange: Sign-up for a free-trial and we'll send you your permanent license!

Here is what you get: 30 Nodes | Unlimited Sensors | No Time Restrictions | Absolutely FREE!

Act now. This offer ends July 14, 2017.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Active Directory security has been a hot topic of late, and for good reason. With 90% of the world’s organization using this system to manage access to all parts of their IT infrastructure, knowing how to protect against threats and keep vulnerabil…
Recently, Microsoft released a best-practice guide for securing Active Directory. It's a whopping 300+ pages long. Those of us tasked with securing our company’s databases and systems would, ideally, have time to devote to learning the ins and outs…
Sending a Secure fax is easy with eFax Corporate (http://www.enterprise.efax.com). First, just open a new email message. In the To field, type your recipient's fax number @efaxsend.com. You can even send a secure international fax — just include t…
With Secure Portal Encryption, the recipient is sent a link to their email address directing them to the email laundry delivery page. From there, the recipient will be required to enter a user name and password to enter the page. Once the recipient …

729 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question