Well, the most time consuming part of security processing is the encryption/decryption with the public/private key. The symmetric algorithms (regardless which one you choose) are only a small fraction of this overall time.
Some time ago I did some performance checks with the usual bouncy castle library and later using JuiCE that wraps openSSL. Have a look at these mails in the archive: <http://mail-archives.apache.org/mod_mbox/ws-wss4j-dev/200510.mbox/[EMAIL PROTECTED]> Regards, Werner > -----Ursprüngliche Nachricht----- > Von: ext at4david [mailto:[EMAIL PROTECTED] > Gesendet: Sonntag, 30. September 2007 20:13 > An: wss4j-dev@ws.apache.org > Betreff: Re: Newbye Question:HOW IS SESSION KEY CREATED??? > > > Thank you for your answer, I would like to measure how long > does Axis with > WSS4J in process a message depending of symetric algorithym > used, how I > could do it?? > > Thank you in advance > -- > View this message in context: > http://www.nabble.com/Newbye-Question%3AHOW-IS-SESSION-KEY-CRE ATED----tf4543074.html#a12968332 > Sent from the WSS4J mailing list archive at Nabble.com. > > > --------------------------------------------------------------------- > To unsubscribe, e-mail: [EMAIL PROTECTED] > For additional commands, e-mail: [EMAIL PROTECTED] > > --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]