Greetings again. 'openssl speed' without other arguments tests a zillion hash
and encryption algorithms but a small subset of the signature algorithms. I
would have hoped that ecdsa would be in that default list. Either that, or
nuke some of the niche algorithms like Camilla and rmd160 and
Greetings again. 'openssl speed' is useful for comparing the speed of various
algorithms. NIST SP 800-56A says that RSA with 3072-bit keys have about the
same strength as 128-bit symmetric ciphers. However, the arguments for 'openssl
speed' jump from rsa2048 to rsa4096. Having an rsa3072 would