Re: [IPsec] DH keys calculation performance

Vishwas Manral <vishwas.ietf@gmail.com> Tue, 26 July 2011 04:37 UTC

Return-Path: <vishwas.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA00211E807F for <ipsec@ietfa.amsl.com>; Mon, 25 Jul 2011 21:37:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.539
X-Spam-Level:
X-Spam-Status: No, score=-2.539 tagged_above=-999 required=5 tests=[AWL=1.059, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mcrsE189m1h0 for <ipsec@ietfa.amsl.com>; Mon, 25 Jul 2011 21:37:39 -0700 (PDT)
Received: from mail-vw0-f44.google.com (mail-vw0-f44.google.com [209.85.212.44]) by ietfa.amsl.com (Postfix) with ESMTP id 7983A21F8591 for <ipsec@ietf.org>; Mon, 25 Jul 2011 21:37:39 -0700 (PDT)
Received: by vws12 with SMTP id 12so56385vws.31 for <ipsec@ietf.org>; Mon, 25 Jul 2011 21:37:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=FEqtnf5KdazC33yj2mdAOfX70h7hxBUbwL0o3FbsMtE=; b=DXoYFiPXcJE1neueQ8DxyU6C4NkyDLdsn1W6r3y+q+m/hcEdM/ZKathPOac4dDXBEv 8CTTKC50xDtgamwzy6KNAN2HCA/tZaMhWTjq5BsfZrR3IrCFkINjezQpTEzo4ALZyO0s 61iZmAywlbzD1pWhe25UwPDkiit4NwGDcU2qM=
MIME-Version: 1.0
Received: by 10.52.64.143 with SMTP id o15mr5258847vds.45.1311655058830; Mon, 25 Jul 2011 21:37:38 -0700 (PDT)
Received: by 10.52.158.234 with HTTP; Mon, 25 Jul 2011 21:37:38 -0700 (PDT)
In-Reply-To: <B97B134FACB2024DB45F524AB0A7B7F203ED2B05@XMB-BGL-419.cisco.com>
References: <20013.29623.491247.654466@fireball.kivinen.iki.fi> <B97B134FACB2024DB45F524AB0A7B7F203ED2B05@XMB-BGL-419.cisco.com>
Date: Mon, 25 Jul 2011 21:37:38 -0700
Message-ID: <CAOyVPHSi=jZBXoH9mbWdOiOFhd=2B1cjXKPJrMn9Lwc7gThZ3w@mail.gmail.com>
From: Vishwas Manral <vishwas.ietf@gmail.com>
To: "Prashant Batra (prbatra)" <prbatra@cisco.com>
Content-Type: multipart/alternative; boundary="20cf30776153d9770504a8f17d4d"
Cc: ipsec@ietf.org
Subject: Re: [IPsec] DH keys calculation performance
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Jul 2011 04:37:41 -0000

Hi Prashant,

Back in the days we had some acceleration of DH in the hardware
http://www.wipo.int/patentscope/search/en/WO2005008999.

Other things you can do is put in more CPU or use a lower DH group.

Thanks,
Vishwas

On Mon, Jul 25, 2011 at 8:29 PM, Prashant Batra (prbatra) <prbatra@cisco.com
> wrote:

> Hello,
>
> The DH exchange (Calculation of Public/Private key and the Secret) in
> IKEV2 Initial exchange
> seems to be very expensive. This is slowing down the overall IKEv2
> tunnel establishment.
> Is there a way to optimize it?
>
>
> Regards,
> Prashant
>