Tom Biggs wrote:
> 
> Our crypto accelerator uses Montgomery's Method.  Just as in OpenSSL's
> eay RSA functions, the chip has pre-calculation initialization steps.
> I can tell the chip to just do them each time, but of course it is faster
> to only do it once for each modulus (n, or p and q) and cache the results
> to use with future calculations.
> 
> I noticed that eay does the BN_MONT_CTX_set() only once.  To me, that
> looks like an assumption that the modulus in the RSA structure will not
> be altered during the structure's lifetime.  Is that true?  I hope so.
> 

Yes that's true.

> Another question - my understanding is that the SSL server will mostly
> be doing private key decryptions in RSA key exchange - correct?
> 

For typical "browser" strong crypto ciphersuites (i.e. those using RSA
key exchange) that is correct. For RSA key exchange weak export
ciphersuites (also supported by browsers) and ephemeral ones using RSA
for authentication (not supported by many browsers yet) RSA signing also
occurs.

Steve.
-- 
Dr Stephen N. Henson.   http://www.drh-consultancy.demon.co.uk/
Personal Email: [EMAIL PROTECTED] 
Senior crypto engineer, Gemplus: http://www.gemplus.com/
Core developer of the   OpenSSL project: http://www.openssl.org/
Business Email: [EMAIL PROTECTED] PGP key: via homepage.
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
Development Mailing List                       [EMAIL PROTECTED]
Automated List Manager                           [EMAIL PROTECTED]

Reply via email to