Software optimizations for cryptographic primitives on general purpose x86-64 platforms

Research output: Chapter in Book/Report/Conference proceedingConference contributionpeer-review

Abstract

The need for end-to-end security in the internet, constantly increases the world-wide number (and percentage) of SSL/TLS connections. As a result, the cryptographic algorithms that support such secure communications become a critical computational load for servers, and therefore an important target for optimization. We discuss here techniques for speeding up the software performance of several important cryptographic primitives on the ubiquitous x86-64 architectures that are used in most server platforms, and report new and improved results. A few examples are the following performance numbers, measured on the 2 nd Generation Intel® Core™ processor: RSA1024/2048 implementation which is ∼1.6x faster than the current OpenSSL version (1.0.0e), and SHA-1, SHA-256 and SHA-512 performing at, respectively, 5.75, 14, 9.71 cycles per byte.

Original languageEnglish
Title of host publicationProgress in Cryptology, INDOCRYPT 2011 - 12th International Conference on Cryptology in India, Proceedings
Pages399-400
Number of pages2
DOIs
StatePublished - 2011
Event12th International Conference on Cryptology in India, INDOCRYPT 2011 - Chennai, India
Duration: 11 Dec 201114 Dec 2011

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume7107 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Conference

Conference12th International Conference on Cryptology in India, INDOCRYPT 2011
Country/TerritoryIndia
CityChennai
Period11/12/1114/12/11

Keywords

  • RSA
  • SHA-256
  • SHA512
  • software optimization
  • x86-64 architectures

ASJC Scopus subject areas

  • Theoretical Computer Science
  • General Computer Science

Fingerprint

Dive into the research topics of 'Software optimizations for cryptographic primitives on general purpose x86-64 platforms'. Together they form a unique fingerprint.

Cite this