On 12/21/2012 01:13 PM, Tayade, Nilesh wrote:

I am using the RSA_private_decrypt() function in one of the custom 
applications, where we expect the premaster to get decrypted faster.
I tried looking at the time consumed by RSA_private_decrypt and loops involved 
in pseudo-random function to compute key.
It is seen that RSA_private_decrypt is taking almost 64 mili-seconds to decrypt 
the premaster secret.
Did someone observe this? Is there some way I can enhance the performance (like 
cache some parameters etc.)?

Asymmetric cryptography tends to be expensive, especially with larger keys.

If the clients are cooperative, you could enable session resumption. With that, only the first connection from each client would have to perform the RSA operation, the subsequent TLS handshakes are much quicker.

--
Florian Weimer / Red Hat Product Security Team
______________________________________________________________________
OpenSSL Project                                 http://www.openssl.org
User Support Mailing List                    openssl-users@openssl.org
Automated List Manager                           majord...@openssl.org

Reply via email to