Hi Pete,

 

Unless I'm missing something, it sounds like the ~100x performance is on
secp***k1 (Koblitz curves) right ? Likely due to this (Link to Google Books
<http://books.google.com/books?id=w6b0yhURTkQC&pg=PA355&lpg=PA355&dq=GLV+kob
litz&source=bl&ots=0UIsfzcTFU&sig=YnBnJYvM8SKWTA8WWTSTHx11hXM&hl=en&sa=X&ei=
lI4DU53aJsG62gXZ7oDwBA&ved=0CEoQ6AEwAw#v=onepage&q=GLV%20koblitz&f=false> )?

 

Or were the improvements generic enough to have that 100x improvement on
secp***r1 (Suite B) curves too? Would be helpful to know for those on suite
b ciphers.

 

Thanks

Sid

 

From: Peter Dettman [mailto:peter.dett...@bouncycastle.org] 
Sent: Tuesday, February 18, 2014 4:44 AM
To: Bouncy Castle Developer List
Subject: Re: [dev-crypto-csharp] Latest Git build, issues with
isismtt\x509\AdmissionSyntax.cs

 

Hi Chris,
If you want the full performance improvements for secp192k1 or secp256k1,
from latest code (i.e. beta.1), please use

    Crypto.EC.CustomNamedCurves.GetByName("secp***k1")

to get your curve/parameters (secp160k1 and secp224k1 may be implemented in
due course - presently there's also P-192/P-256/P-521 and their secp***r1
equivalents).

It is little exaggeration, if any, to say that these "custom" curves are 2
orders of magnitude (100x) faster than what was in 1.7.

Regards,
Pete Dettman

On 14/02/2014 12:20 AM, Mankowski, Chris wrote:

Also, thank you for working on the scep***k1 curve improvements.  I can't
wait to try them out!

  _____  

 

 

Reply via email to