Cryptographic Performance on the
2nd Generation Intel® Core™ processor family
2
Executive Summary
The latest 2
nd
Generation Intel® Core™ processor family brings huge
performance increases to cryptographic applications.
Cryptographic algorithms consist of public and private key operations,
combined with secure hashing. We examine the performance of a small
representative set of algorithms on the new processors, and compare
with the performance of the Intel® microarchitecture code named
Westmere.
This paper describes the performance increase that can be achieved
on the 2
nd
Generation Intel® Core™ processor family over the Intel®
microarchitecture code named Westmere, on cryptographic
applications. We show the results on a small representative sample
set of algorithms optimized for performance on each processor. The
net result is an improvement in cryptographic performance up to
~1.8X over the previous Intel processors
.
The Intel
®
Embedded Design Center provides qualified developers with
web-based access to technical resources. Access Intel Confidential design
materials, step-by step guidance, application reference solutions,
training, Intel’s tool loaner program, and connect with an e-help desk
1
Software and workloads used in performance tests may have been optimized for performance
only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are
measured using specific computer systems, components, software, operations and functions.
Any change to any of those factors may cause the results to vary. You should consult other
information and performance tests to assist you in fully evaluating your contemplated
purchases, including the performance of that product when combined with other products.
Configuration: Refer to the Performance section. For more information go to