Re: [IPsec] DH keys calculation performance
Vishwas Manral <vishwas.ietf@gmail.com> Tue, 26 July 2011 04:37 UTC
Return-Path: <vishwas.ietf@gmail.com>
X-Original-To: ipsec@ietfa.amsl.com
Delivered-To: ipsec@ietfa.amsl.com
Received: from localhost (localhost [127.0.0.1]) by ietfa.amsl.com (Postfix) with ESMTP id DA00211E807F for <ipsec@ietfa.amsl.com>; Mon, 25 Jul 2011 21:37:40 -0700 (PDT)
X-Virus-Scanned: amavisd-new at amsl.com
X-Spam-Flag: NO
X-Spam-Score: -2.539
X-Spam-Level:
X-Spam-Status: No, score=-2.539 tagged_above=-999 required=5 tests=[AWL=1.059, BAYES_00=-2.599, HTML_MESSAGE=0.001, RCVD_IN_DNSWL_LOW=-1]
Received: from mail.ietf.org ([64.170.98.30]) by localhost (ietfa.amsl.com [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mcrsE189m1h0 for <ipsec@ietfa.amsl.com>; Mon, 25 Jul 2011 21:37:39 -0700 (PDT)
Received: from mail-vw0-f44.google.com (mail-vw0-f44.google.com [209.85.212.44]) by ietfa.amsl.com (Postfix) with ESMTP id 7983A21F8591 for <ipsec@ietf.org>; Mon, 25 Jul 2011 21:37:39 -0700 (PDT)
Received: by vws12 with SMTP id 12so56385vws.31 for <ipsec@ietf.org>; Mon, 25 Jul 2011 21:37:38 -0700 (PDT)
DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :cc:content-type; bh=FEqtnf5KdazC33yj2mdAOfX70h7hxBUbwL0o3FbsMtE=; b=DXoYFiPXcJE1neueQ8DxyU6C4NkyDLdsn1W6r3y+q+m/hcEdM/ZKathPOac4dDXBEv 8CTTKC50xDtgamwzy6KNAN2HCA/tZaMhWTjq5BsfZrR3IrCFkINjezQpTEzo4ALZyO0s 61iZmAywlbzD1pWhe25UwPDkiit4NwGDcU2qM=
MIME-Version: 1.0
Received: by 10.52.64.143 with SMTP id o15mr5258847vds.45.1311655058830; Mon, 25 Jul 2011 21:37:38 -0700 (PDT)
Received: by 10.52.158.234 with HTTP; Mon, 25 Jul 2011 21:37:38 -0700 (PDT)
In-Reply-To: <B97B134FACB2024DB45F524AB0A7B7F203ED2B05@XMB-BGL-419.cisco.com>
References: <20013.29623.491247.654466@fireball.kivinen.iki.fi> <B97B134FACB2024DB45F524AB0A7B7F203ED2B05@XMB-BGL-419.cisco.com>
Date: Mon, 25 Jul 2011 21:37:38 -0700
Message-ID: <CAOyVPHSi=jZBXoH9mbWdOiOFhd=2B1cjXKPJrMn9Lwc7gThZ3w@mail.gmail.com>
From: Vishwas Manral <vishwas.ietf@gmail.com>
To: "Prashant Batra (prbatra)" <prbatra@cisco.com>
Content-Type: multipart/alternative; boundary="20cf30776153d9770504a8f17d4d"
Cc: ipsec@ietf.org
Subject: Re: [IPsec] DH keys calculation performance
X-BeenThere: ipsec@ietf.org
X-Mailman-Version: 2.1.12
Precedence: list
List-Id: Discussion of IPsec protocols <ipsec.ietf.org>
List-Unsubscribe: <https://www.ietf.org/mailman/options/ipsec>, <mailto:ipsec-request@ietf.org?subject=unsubscribe>
List-Archive: <http://www.ietf.org/mail-archive/web/ipsec>
List-Post: <mailto:ipsec@ietf.org>
List-Help: <mailto:ipsec-request@ietf.org?subject=help>
List-Subscribe: <https://www.ietf.org/mailman/listinfo/ipsec>, <mailto:ipsec-request@ietf.org?subject=subscribe>
X-List-Received-Date: Tue, 26 Jul 2011 04:37:41 -0000
Hi Prashant, Back in the days we had some acceleration of DH in the hardware http://www.wipo.int/patentscope/search/en/WO2005008999. Other things you can do is put in more CPU or use a lower DH group. Thanks, Vishwas On Mon, Jul 25, 2011 at 8:29 PM, Prashant Batra (prbatra) <prbatra@cisco.com > wrote: > Hello, > > The DH exchange (Calculation of Public/Private key and the Secret) in > IKEV2 Initial exchange > seems to be very expensive. This is slowing down the overall IKEv2 > tunnel establishment. > Is there a way to optimize it? > > > Regards, > Prashant >
- [IPsec] New Version Notification for draft-kivine… Tero Kivinen
- [IPsec] DH keys calculation performance Prashant Batra (prbatra)
- Re: [IPsec] DH keys calculation performance Vishwas Manral
- Re: [IPsec] DH keys calculation performance Yoav Nir
- Re: [IPsec] DH keys calculation performance Yaron Sheffer
- Re: [IPsec] DH keys calculation performance Prashant Batra (prbatra)
- Re: [IPsec] DH keys calculation performance Dan Harkins
- Re: [IPsec] DH keys calculation performance Scott Fluhrer (sfluhrer)
- Re: [IPsec] DH keys calculation performance Yoav Nir
- Re: [IPsec] DH keys calculation performance Hugo Krawczyk
- Re: [IPsec] DH keys calculation performance Scott Fluhrer (sfluhrer)
- [IPsec] IPSec implementation query. Prashant Batra (prbatra)
- Re: [IPsec] DH keys calculation performance Naveen B N (nbn)
- Re: [IPsec] DH keys calculation performance Naveen B N (nbn)
- Re: [IPsec] DH keys calculation performance Scott Fluhrer (sfluhrer)
- Re: [IPsec] DH keys calculation performance Naveen B N (nbn)
- [IPsec] New method to resist replay attack in ike… ramaswamy
- Re: [IPsec] DH keys calculation performance Scott Fluhrer (sfluhrer)
- Re: [IPsec] DH keys calculation performance Naveen B N (nbn)
- Re: [IPsec] Perfect Forward secrecy Naveen B N (nbn)
- Re: [IPsec] Perfect Forward secrecy Yoav Nir
- Re: [IPsec] Perfect Forward secrecy Dan Harkins
- Re: [IPsec] Tokes = Session key + lifetime Naveen B N (nbn)
- Re: [IPsec] Perfect Forward secrecy Stephen Kent
- Re: [IPsec] Avoid multiple authentication's Naveen B N (nbn)
- Re: [IPsec] Avoid multiple authentication's Yaron Sheffer
- Re: [IPsec] Avoid multiple authentication's Naveen B N (nbn)
- [IPsec] New method to resist replay attack in ike… Tero Kivinen
- Re: [IPsec] New method to resist replay attack in… ramaswamy
- Re: [IPsec] New method to resist replay attack in… Tero Kivinen
- Re: [IPsec] New method to resist replay attack in… ramaswamy
- Re: [IPsec] New method to resist replay attack in… ramaswamy
- Re: [IPsec] New method to resist replay attack in… ramaswamy