Re: [Ace] on signature verification times for sec192r1
Michael StJohns <mstjohns@comcast.net> Sat, 23 July 2016 21:59 UTC
Return-Path: <mstjohns@comcast.net>
X-Original-To: ace@ietfa.amsl.com
Delivered-To: ace@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id 32FBA12D7D6 for <ace@ietfa.amsl.com>; Sat, 23 Jul 2016 14:59:11 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -3.986
X-Spam-Level:
X-Spam-Status: No, score=-3.986 tagged_above=-999 required=5 tests=[BAYES_00=-1.9, DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, FREEMAIL_FROM=0.001, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-0.7, RP_MATCHES_RCVD=-1.287, SPF_PASS=-0.001] autolearn=ham autolearn_force=no
Authentication-Results: ietfa.amsl.com (amavisd-new); dkim=pass (2048-bit key) header.d=comcast.net
Received: from mail.ietf.org ([4.31.198.44]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id jNrb9_AqYlIs for <ace@ietfa.amsl.com>; Sat, 23 Jul 2016 14:59:09 -0700 (PDT)
Received: from resqmta-po-10v.sys.comcast.net (resqmta-po-10v.sys.comcast.net [IPv6:2001:558:fe16:19:96:114:154:169]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ietfa.amsl.com (Postfix) with ESMTPS id 5654212D0AA for <ace@ietf.org>; Sat, 23 Jul 2016 14:59:09 -0700 (PDT)
Received: from resomta-po-20v.sys.comcast.net ([96.114.154.244]) by resqmta-po-10v.sys.comcast.net with SMTP id R4wgb6x4LHqolR4wubIDxh; Sat, 23 Jul 2016 21:59:08 +0000
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=comcast.net; s=q20140121; t=1469311148; bh=bc6R++pY8zH6YYZRRCDFx9xGiU+xLpYVqTmFNtatOf0=; h=Received:Received:Subject:To:From:Message-ID:Date:MIME-Version: Content-Type; b=HEw4aFsP5/oBjjpGi3ZZB525Pt8gciGgBY5JUNJIISHKXB45whj1HAGCZ4m+v48at qqiEJKBuHoF8lupH33g4WVjVljiKOf0Uu033zFO8bLM3jotE0YVZLsoNIB/F1gCx+q f/uBXG7i1Pot5E7IL3xcyM+ROuzwuC8kqnW9P7vHVoQ1tOO8rJrZyhhLSaJ670qsXl Bx2VwN5e3r1M6wBmQJh9X1s8GN/6FtDIS7LNc6ZLQArqcTw2MsyBF5gOlQeNDwid6H YhTtSY03XoMzGVAwG91pGWNhbTVZcyVNo7OHZdvX0cFWx0PBJB38SDQaBmS0PVQSpb PNSYGkm/Msgcw==
Received: from [IPv6:2601:148:c000:1951:90d5:2c48:d5ce:4e3f] ([IPv6:2601:148:c000:1951:90d5:2c48:d5ce:4e3f]) by comcast with SMTP id R4wubLxqORT4NR4wubtB6M; Sat, 23 Jul 2016 21:59:08 +0000
To: ace@ietf.org
References: <CAEQGKXRxLKGROW9MdJEzkXsS9f4NVFqqh12c+t4qaK5bDYhuaw@mail.gmail.com>
From: Michael StJohns <mstjohns@comcast.net>
Message-ID: <d107de0f-2134-5b80-c9e2-ddb5e5e79788@comcast.net>
Date: Sat, 23 Jul 2016 17:59:15 -0400
User-Agent: Mozilla/5.0 (Windows NT 6.1; WOW64; rv:45.0) Gecko/20100101 Thunderbird/45.2.0
MIME-Version: 1.0
In-Reply-To: <CAEQGKXRxLKGROW9MdJEzkXsS9f4NVFqqh12c+t4qaK5bDYhuaw@mail.gmail.com>
Content-Type: multipart/alternative; boundary="------------132F7A06DFB15BB94B4B605D"
X-CMAE-Envelope: MS4wfFQY++diNZCsNuOiatAqRxYTiAvTMBe0F6Xe8v1FCX89C45zqTBAzu5LKaORnvKkfwFLuktuSizXb+y2VzXmlVN32aIv/hs/FXhjFOVEYeSQVr9sZ8yd noNICGvkAvaaVqdF6a/KDWNmkCsvLKA98opujhqrDVh7Si2DSRxa1Lv0YtnyBY4M7yNeC2J0ueIuEw==
Archived-At: <https://mailarchive.ietf.org/arch/msg/ace/RkcwdtQEPG6AcyqIiwKscFR-WuI>
Subject: Re: [Ace] on signature verification times for sec192r1
X-BeenThere: ace@ietf.org
X-Mailman-Version: 2.1.17
Precedence: list
List-Id: "Authentication and Authorization for Constrained Environments \(ace\)" <ace.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ace>, <mailto:ace-request@ietf.org?subject=unsubscribe>
List-Archive: <https://mailarchive.ietf.org/arch/browse/ace/>
List-Post: <mailto:ace@ietf.org>
List-Help: <mailto:ace-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ace>, <mailto:ace-request@ietf.org?subject=subscribe>
X-List-Received-Date: Sat, 23 Jul 2016 21:59:11 -0000
On 7/23/2016 11:10 AM, Pascal Urien wrote: > Hi All > > J3A081M is a javacard device from NXP > > The micocontroller should be the P5CD081V1A, which comprises a crypto > processor There's a number of these from a number of vendors. I'd actually look at the A7xxx series of chips as they're designed to be embeddable. I've become a big fan of javacard style solutions over the years. In any event, the number of relatively inexpensive public key crypto accelerator chips (e.g. googl for "secure authentication chips") is greater than zero and continues to climb. And for not a lot of money. Estimating what from prices on Digikey, I'd think something less than $.50 for Quantity large as of today and half that or less in 1-2 years as its gets bundled into the "Swiss Army Knife" style of process (e.g. support for wireless 900mhz plus ... plus ... plus ... plus security...) (google for iot module secure element 900mhz for example). Later, Mike > > The performances with the curve secp192r1 are the following (for ECDSA > + SHA1) > > Sign = 40ms + nb_bloc_512bits x 3.5 ms > Verify = 60ms + nb_bloc_512bits x 3,5 ms > > > By the way this chip has enough crypto ressouces for processing TLS or > DTLS > > Rgs > > Pascal > > > _______________________________________________ > Ace mailing list > Ace@ietf.org > https://www.ietf.org/mailman/listinfo/ace
- Re: [Ace] on signature verification times for sec… Pascal Urien
- Re: [Ace] on signature verification times for sec… Hannes Tschofenig
- Re: [Ace] on signature verification times for sec… Hannes Tschofenig
- Re: [Ace] on signature verification times for sec… Somaraju Abhinav
- Re: [Ace] on signature verification times for sec… Pascal Urien
- Re: [Ace] on signature verification times for sec… Somaraju Abhinav
- Re: [Ace] on signature verification times for sec… Pascal Urien
- Re: [Ace] on signature verification times for sec… Michael StJohns
- Re: [Ace] on signature verification times for sec… Pascal Urien
- [Ace] on signature verification times for sec192r1 Pascal Urien
- Re: [Ace] on signature verification times for sec… Pascal Urien