> -----Original Message-----
> From: Florian Weimer [mailto:fwei...@redhat.com]
> Sent: Friday, December 21, 2012 5:58 PM
> To: openssl-users@openssl.org
> Cc: Tayade, Nilesh
> Subject: Re: RSA_private_decrypt function takes longer time.
> 
> On 12/21/2012 01:13 PM, Tayade, Nilesh wrote:
> 
> > I am using the RSA_private_decrypt() function in one of the custom
> applications, where we expect the premaster to get decrypted faster.
> > I tried looking at the time consumed by RSA_private_decrypt and loops
> involved in pseudo-random function to compute key.
> > It is seen that RSA_private_decrypt is taking almost 64 mili-seconds
> to decrypt the premaster secret.
> > Did someone observe this? Is there some way I can enhance the
> performance (like cache some parameters etc.)?
> 
> Asymmetric cryptography tends to be expensive, especially with larger
> keys.
> 
> If the clients are cooperative, you could enable session resumption.
> With that, only the first connection from each client would have to
> perform the RSA operation, the subsequent TLS handshakes are much
> quicker.

Thanks. Yes, the session resumption is enabled. But my goal is to evaluate the 
max concurrent sessions which could be handled.
So we are emulating many new SSL sessions being opened with single server.

> --
> Florian Weimer / Red Hat Product Security Team

--
Thanks,
Nilesh
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to