Hi Marc,

Thank you for your email.

I will have a look at the code, when I get back from vacation two weeks from now.


On 10/07/2009, at 10.18, Marc Makkes wrote:

Hi Janus,

I think that I'd have reached the stage where you can test my code, but
still lacks some basic checks and is still prone to timing attacks and
is basically the same viffs current implementation, with some additional speedups. So consequently, it code should only be used for testing purposes
only.

I'm achieving the following speeds on my atom N270 ( 1.6Ghz ) testing
with key sizes of 2048 bit.

Viff code:
----------
Encrypting:
10 loops, best of 3: 4.42 sec per loop
Decrypting:
10 loops, best of 3: 925 msec per loop

My code:
--------
Encrypting:
10 loops, best of 3: 496 msec per loop
Decrypting:
10 loops, best of 3: 143 msec per loop

For encrypting its almost a 9 fold speedup and for decrypting 6.5 times
with respect to the current implementation.

In the tar ball you find the small makefile as well as a test.py file.
It shows the basic use of all functions. If you have any comments, issues
or questions please let me know.

Happy testing,

-Marc

____________________________________________________

Janus Dam Nielsen

R&D SCIENTIST, PhD.
CENTRE FOR IT-SECURITY

THE ALEXANDRA INSTITUTE LTD.

T +45 42 22 93 56
E janus.niel...@alexandra.dk
W alexandra.dk
____________________________________________________

_______________________________________________
viff-devel mailing list (http://viff.dk/)
viff-devel@viff.dk
http://lists.viff.dk/listinfo.cgi/viff-devel-viff.dk

Reply via email to