On 12/21/2012 01:13 PM, Tayade, Nilesh wrote:
I am using the RSA_private_decrypt() function in one of the custom
applications, where we expect the premaster to get decrypted faster.
I tried looking at the time consumed by RSA_private_decrypt and loops involved
in pseudo-random function to compute key.
It is seen that RSA_private_decrypt is taking almost 64 mili-seconds to decrypt
the premaster secret.
Did someone observe this? Is there some way I can enhance the performance (like
cache some parameters etc.)?
Asymmetric cryptography tends to be expensive, especially with larger keys.
If the clients are cooperative, you could enable session resumption.
With that, only the first connection from each client would have to
perform the RSA operation, the subsequent TLS handshakes are much quicker.
--
Florian Weimer / Red Hat Product Security Team
______________________________________________________________________
OpenSSL Project http://www.openssl.org
User Support Mailing List openssl-users@openssl.org
Automated List Manager majord...@openssl.org