Tom Biggs wrote: > > Our crypto accelerator uses Montgomery's Method. Just as in OpenSSL's > eay RSA functions, the chip has pre-calculation initialization steps. > I can tell the chip to just do them each time, but of course it is faster > to only do it once for each modulus (n, or p and q) and cache the results > to use with future calculations. > > I noticed that eay does the BN_MONT_CTX_set() only once. To me, that > looks like an assumption that the modulus in the RSA structure will not > be altered during the structure's lifetime. Is that true? I hope so. >
Yes that's true. > Another question - my understanding is that the SSL server will mostly > be doing private key decryptions in RSA key exchange - correct? > For typical "browser" strong crypto ciphersuites (i.e. those using RSA key exchange) that is correct. For RSA key exchange weak export ciphersuites (also supported by browsers) and ephemeral ones using RSA for authentication (not supported by many browsers yet) RSA signing also occurs. Steve. -- Dr Stephen N. Henson. http://www.drh-consultancy.demon.co.uk/ Personal Email: [EMAIL PROTECTED] Senior crypto engineer, Gemplus: http://www.gemplus.com/ Core developer of the OpenSSL project: http://www.openssl.org/ Business Email: [EMAIL PROTECTED] PGP key: via homepage. ______________________________________________________________________ OpenSSL Project http://www.openssl.org Development Mailing List [EMAIL PROTECTED] Automated List Manager [EMAIL PROTECTED]
