diff options
author | lloyd <[email protected]> | 2010-03-21 23:27:31 +0000 |
---|---|---|
committer | lloyd <[email protected]> | 2010-03-21 23:27:31 +0000 |
commit | 572c106e868821da13447ca7349523ef4a90ec2c (patch) | |
tree | 3861fbf22b815c60944232651632ece49e37a2b3 | |
parent | f1a2c2636f83892bcb5dbd47618b9ce82a7d5e87 (diff) |
Don't bother benchmarking 512 or 768 bit keys; considering an RSA
modulus of 768 bits has already been publicly factored, and discrete
logarithm algorithms run in about the same time, these keys aren't safe
to use no matter how fast they are.
Also remove the 8192 bit RSA/RW keys - it took too long to generate them,
and nobody is likely to be using 8K bit keys anytime soon anyway.
-rw-r--r-- | checks/pk_bench.cpp | 11 |
1 files changed, 4 insertions, 7 deletions
diff --git a/checks/pk_bench.cpp b/checks/pk_bench.cpp index 3f9356b4a..41344f104 100644 --- a/checks/pk_bench.cpp +++ b/checks/pk_bench.cpp @@ -189,7 +189,7 @@ void benchmark_rsa(RandomNumberGenerator& rng, Benchmark_Report& report) { - size_t keylens[] = { 512, 1024, 2048, 4096, 6144, 8192, 0 }; + size_t keylens[] = { 1024, 2048, 4096, 6144, 0 }; for(size_t i = 0; keylens[i]; ++i) { @@ -264,7 +264,7 @@ void benchmark_rw(RandomNumberGenerator& rng, Benchmark_Report& report) { - const u32bit keylens[] = { 512, 1024, 2048, 4096, 6144, 8192, 0 }; + const u32bit keylens[] = { 1024, 2048, 4096, 6144, 0 }; for(size_t j = 0; keylens[j]; j++) { @@ -458,9 +458,7 @@ void benchmark_dsa_nr(RandomNumberGenerator& rng, Benchmark_Report& report) { #if defined(BOTAN_HAS_NYBERG_RUEPPEL) || defined(BOTAN_HAS_DSA) - const char* domains[] = { "dsa/jce/512", - "dsa/jce/768", - "dsa/jce/1024", + const char* domains[] = { "dsa/jce/1024", "dsa/botan/2048", "dsa/botan/3072", NULL }; @@ -508,8 +506,7 @@ void benchmark_dh(RandomNumberGenerator& rng, double seconds, Benchmark_Report& report) { - const char* domains[] = { "modp/ietf/768", - "modp/ietf/1024", + const char* domains[] = { "modp/ietf/1024", "modp/ietf/2048", "modp/ietf/3072", "modp/ietf/4096", |