background image

Cryptographic Performance on the 

 

2

nd

 Generation Intel® Core™ processor family

 

 

 

 

11 

INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

®

 PRODUCTS.  NO 

LICENSE, EXPRESS OR IMPLIED, BY ESTOPPEL OR OTHERWISE, TO ANY INTELLECTUAL PROPERTY 
RIGHTS IS GRANTED BY THIS DOCUMENT. EXCEPT AS PROVIDED IN INTEL’S TERMS AND 
CONDITIONS OF SALE FOR SUCH PRODUCTS, INTEL ASSUMES NO LIABILITY WHATSOEVER, AND 
INTEL DISCLAIMS ANY EXPRESS OR IMPLIED WARRANTY, RELATING TO SALE AND/OR USE OF 
INTEL PRODUCTS INCLUDING LIABILITY OR WARRANTIES RELATING TO FITNESS FOR A 
PARTICULAR PURPOSE, MERCHANTABILITY, OR INFRINGEMENT OF ANY PATENT, COPYRIGHT OR 
OTHER INTELLECTUAL PROPERTY RIGHT. Intel products are not intended for use in medical, life 
saving, or life sustaining applications. 

Intel may make changes to specifications and product descriptions at any time, without notice.  

This paper is for informational purposes only. THIS DOCUMENT IS PROVIDED "AS IS" WITH NO 
WARRANTIES WHATSOEVER, INCLUDING ANY WARRANTY OF MERCHANTABILITY, 
NONINFRINGEMENT, FITNESS FOR ANY PARTICULAR PURPOSE, OR ANY WARRANTY OTHERWISE 
ARISING OUT OF ANY PROPOSAL, SPECIFICATION OR SAMPLE. Intel disclaims all liability, including 
liability for infringement of any proprietary rights, relating to use of information in this specification. 
No license, express or implied, by estoppel or otherwise, to any intellectual property rights is granted 
herein. 

Hyper-Threading Technology requires a computer system with a processor supporting HT Technology 
and an HT Technology-enabled chipset, BIOS and operating system. Performance will vary 
depending on the specific hardware and software you use. For more information including details on 
which processors support HT Technology, see here. 

64-bit computing on Intel architecture requires a computer system with a processor, chipset, BIOS, 
operating system, device drivers and applications enabled for Intel® 64 architecture. Performance 
will vary depending on your hardware and software configurations. Consult with your system vendor 
for more information. 

Intel® Turbo Boost Technology requires a PC with a processor with Intel Turbo Boost Technology 
capability. Intel Turbo Boost Technology performance varies depending on hardware, software and 
overall system configuration. Check with your PC manufacturer on whether your system delivers 
Intel Turbo Boost Technology.For more information, see 

Intel Inside, Intel Inside logo, Intel. Leap ahead., Intel. Leap ahead. logo, Intel Turbo Boost 
Technology, Intel Hyper Threading Technology, Intel Xeon, and Xeon Inside are trademarks or 
registered trademarks of Intel Corporation or its subsidiaries in the U.S. and other countries. 

Intel ® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel 
software to execute the instructions in the correct sequence.  AES-NI is available on Intel® Core™ 
i5-600 Desktop Processor Series, Intel® Core™ i7-600 Mobile Processor Series, and Intel® Core™ 
i5-500 Mobile Processor Series.  For availability, consult your reseller or system manufacturer.  For 
more information, see
*Other names and brands may be claimed as the property of others. 

Copyright © 2011 Intel Corporation. All rights reserved.  

Содержание BX80623I72600K

Страница 1: ...Performance on the 2nd Generation Intel Core processor family January 2011 White Paper Vinodh Gopal Jim Guilford Wajdi Feghali Erdinc Ozturk Gil Wolrich Kirk Yap Sean Gulley Martin Dixon IA Architect...

Страница 2: ...e net result is an improvement in cryptographic performance up to 1 8X over the previous Intel processors1 The Intel Embedded Design Center provides qualified developers with web based access to techn...

Страница 3: ...Cryptographic Performance on the 2nd Generation Intel Core processor family 3 and the embedded community Design Fast Design Smart Get started today www intel com embedded edc...

Страница 4: ...ocessor family 4 Contents Overview 5 Improving Cryptographic Processing 5 Multi Buffer via SIMD 6 Multi Buffer via Data Dependency Hiding 6 Performance 7 Private Key and Secure Hashing Performance 8 P...

Страница 5: ...the RSA DSA and Diffie Hellman algorithms In 3 we demonstrate the fastest implementation of modular exponentiation on Intel processors The 2nd Generation Intel Core processor family improves the perf...

Страница 6: ...ntel AVX Intel Advanced Vector Extensions instruction set 5 resulting in much faster multi buffer hashing Although we process the same number of buffers as with SSE we gain some performance efficiency...

Страница 7: ...ded keys AES using 128 bit keys is a common usage the results will be similar and scale for other key sizes such as 192 and 256 bit keys The modular exponentiation code bases were measured on 512 bit...

Страница 8: ...2 bit Modular Exponentiation 360 880 246 899 1 46 1024 bit Modular Exponentiation 2 722 590 1 906 555 1 43 In this case we observe a large performance boost with the Intel Core i7 2600 processor based...

Страница 9: ...erence http softwarecommunity intel com isn downloads intelavx Intel AVX Programming Reference 31943302 pdf The Intel Embedded Design Center provides qualified developers with web based access to tech...

Страница 10: ...Gopal Jim Guilford Erdinc Ozturk Gil Wolrich Wajdi Feghali Kirk Yap Sean Gulley and Martin Dixon are IA Architects with the IAG Group at Intel Corporation Acronyms IA Intel Architecture API Applicati...

Страница 11: ...tem Performance will vary depending on the specific hardware and software you use For more information including details on which processors support HT Technology see here 64 bit computing on Intel ar...

Отзывы: