Thank you for your email.
I will have a look at the code, when I get back from vacation two
weeks from now.
On 10/07/2009, at 10.18, Marc Makkes wrote:
I think that I'd have reached the stage where you can test my code,
still lacks some basic checks and is still prone to timing attacks and
is basically the same viffs current implementation, with some
speedups. So consequently, it code should only be used for testing
I'm achieving the following speeds on my atom N270 ( 1.6Ghz ) testing
with key sizes of 2048 bit.
10 loops, best of 3: 4.42 sec per loop
10 loops, best of 3: 925 msec per loop
10 loops, best of 3: 496 msec per loop
10 loops, best of 3: 143 msec per loop
For encrypting its almost a 9 fold speedup and for decrypting 6.5
with respect to the current implementation.
In the tar ball you find the small makefile as well as a test.py file.
It shows the basic use of all functions. If you have any comments,
or questions please let me know.
Janus Dam Nielsen
R&D SCIENTIST, PhD.
CENTRE FOR IT-SECURITY
THE ALEXANDRA INSTITUTE LTD.
T +45 42 22 93 56
viff-devel mailing list (http://viff.dk/)