Well, the most time consuming part of security processing
is the encryption/decryption with the public/private key.
The symmetric algorithms (regardless which one you choose)
are only a small fraction of this overall time.

Some time ago I did some performance checks with the usual
bouncy castle library and later using JuiCE that wraps openSSL.
Have a look at these mails in the archive:

<http://mail-archives.apache.org/mod_mbox/ws-wss4j-dev/200510.mbox/[EMAIL 
PROTECTED]>

Regards,
Werner

> -----Ursprüngliche Nachricht-----
> Von: ext at4david [mailto:[EMAIL PROTECTED] 
> Gesendet: Sonntag, 30. September 2007 20:13
> An: wss4j-dev@ws.apache.org
> Betreff: Re: Newbye Question:HOW IS SESSION KEY CREATED???
> 
> 
> Thank you for your answer, I would like to measure how long 
> does Axis with
> WSS4J in process a message depending of symetric algorithym 
> used, how I
> could do it??
> 
> Thank you in advance 
> -- 
> View this message in context: 
> http://www.nabble.com/Newbye-Question%3AHOW-IS-SESSION-KEY-CRE
ATED----tf4543074.html#a12968332
> Sent from the WSS4J mailing list archive at Nabble.com.
> 
> 
> ---------------------------------------------------------------------
> To unsubscribe, e-mail: [EMAIL PROTECTED]
> For additional commands, e-mail: [EMAIL PROTECTED]
> 
> 

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to