-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 On 2012-06-17 20:50, Peter Lebbing wrote: > On 17/06/12 19:26, Hauke Laging wrote: >> start cmd:> time gpg --encrypt --sign 200k-file >> >> Sie benötigen eine Passphrase, um den geheimen Schlüssel zu >> entsperren. Benutzer: "Hauke Laging <ha...@laging.de>" 2048-Bit >> RSA Schlüssel, ID 0x3A403251, erzeugt 2010-03-04 >> (Hauptschlüssel-ID 0xECCB5814) >> >> >> real 0m0.143s user 0m0.086s sys 0m0.008s > > The OP said he encrypted to about 50 recipients. With such a small > file, the asymmetric operation will be way more significant in the > total time than if the file were much larger. You seem to be > encrypting to only one recipient (you have a default-recipient?), > so the comparison is way off. > > Furthermore, you'll need to establish the key size and asym cipher > used for the recipients before you can do a fair comparison. > Because a tin-foil hat RSA 16k key will be a bit more intensive > than a 1k DSA key ;). >
Indeed, the number of recipients and their key parameters will be significant for the time to encrypt. Somewhat off-topic, but to provide a measurement for an encryption and signing using a tin-foil hat key of 15360 bit key, since I for various reasons keep one around in the first place, and don't really get to use it too often; On my email VM, which has 4 cores and 4 GB of RAM, the measurements are as follows: kristianf@ubuntu:~$ dd if=/dev/urandom bs=1024 count=200 > 200kfile kristianf@ubuntu:~$ time gpg2 -aser 43E67CF7 200kfile real 0m2.321s user 0m2.310s sys 0m0.000s where: kristianf@ubuntu:~$ gpg --list-key 43e67cf7 pub 15360R/43E67CF7 2006-12-15 uid Kristian Fiskerstrand <kristian.fiskerstr...@kfwebs.net> uid Kristian Fiskerstrand (Large key) <k...@kfwebs.net> sub 15360g/7CC80A28 2006-12-18 - -- - ---------------------------- Kristian Fiskerstrand http://www.sumptuouscapital.com Twitter: @krifisk - ---------------------------- Corruptissima re publica plurimæ leges The greater the degeneration of the republic, the more of its laws - ---------------------------- This email was digitally signed using the OpenPGP standard. If you want to read more about this The book: Sending Emails - The Safe Way: An introduction to OpenPGP security is now available in both Amazon Kindle and Paperback format at http://www.amazon.com/dp/B006RSG1S4/ - ---------------------------- Public PGP key 0xE3EDFAE3 at http://www.sumptuouscapital.com/pgp/ -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.19 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQIcBAEBCAAGBQJP3iuVAAoJEBbgz41rC5UIATMQAIaMb3wVxAvjuCDPV/v3LXXS Ql7J/w9M0m8ngq4CdU84t2g+6PhENHfL0yvq5xNJwgVAtCHWd1oGtD+WRQx4w9hH 7xsvuQUPTRDL/UTUatNZECYIWFSAj0jzihimBlSJNfaLqWd34RkAgYPzy4vm5pKR acXVvGCrUH3DFfPKo4/ITV/nIiAT6pawvQZBd1qHRSpWp1fzg6TwDnnEapnHva6Z v0/5Z5aaHlxoVsMnb9EnA1DqBTWhGRRMn6L5v/95aIK18C5oYwtawBDLzXF+xpIW iQgwTHkjdXa9z/dEWlzOjSfKG3jlSAFiNDizKLhgFrD0TPrxuuyYgGWPIvNh16tG GlpxeHoiJ0ot0KARXFu1IwTYOG0usxUBDwVW45amwViUkAwVqQTu/ND/Nq1xxUst rZW3zgO56/F2KJ94gMsqverSs24JlagnDnipuUHKb7JDE39FbkLQ8nAHYCw29JZs /Wux1lHgJqKsCRdqNECzZFCcbr8YMiv/bxPi+2xHBJxadrFHhYyiPrxw6ilUfOCN hx/81j46m0VVwfaEl/ZgbGZJeGku3X6YWlPqrlOXzdgnvvD6MnIHMp8fnChMf6qd C/lF9u+EVJqGvLetI6IHEdGqDwrSgvFPgmLZyTs1zpdoQj4raFWKnPb2dVI39V8w 2eUVuSQyRfBJx3IMLev6 =Gfdf -----END PGP SIGNATURE----- _______________________________________________ Gnupg-users mailing list Gnupg-users@gnupg.org http://lists.gnupg.org/mailman/listinfo/gnupg-users