background image

 

Cryptographic Performance on the  

2nd Generation Intel® Core™ processor family 

 

 

2

  

 

 

Executive Summary 

The latest 2

nd

 Generation Intel® Core™ processor family brings huge 

performance increases to cryptographic applications. 

Cryptographic algorithms consist of public and private key operations, 
combined with secure hashing. We examine the performance of a small 
representative set of algorithms on the new processors, and compare 
with the performance of the Intel® microarchitecture code named 
Westmere.  

 This paper describes the performance increase that can be achieved 

on the 2

nd

 Generation Intel® Core™ processor family over the Intel® 

microarchitecture code named Westmere, on cryptographic 

applications. We show the results on a small representative sample 

set of algorithms optimized for performance on each processor. The 

net result is an improvement in cryptographic performance up to 

~1.8X over the previous Intel processors

1

.  

The Intel

®

 Embedded Design Center provides qualified developers with 

web-based access to technical resources. Access Intel Confidential design 
materials, step-by step guidance, application reference solutions, 
training, Intel’s tool loaner program, and connect with an e-help desk 

                                                   

1

 Software and workloads used in performance tests may have been optimized for performance 

only on Intel microprocessors.  Performance tests, such as SYSmark and MobileMark, are 

measured using specific computer systems, components, software, operations and functions.  

Any change to any of those factors may cause the results to vary.  You should consult other 

information and performance tests to assist you in fully evaluating your contemplated 

purchases, including the performance of that product when combined with other products.   

Configuration: Refer to the Performance section.  For more information go to 

 

Содержание BX80623I72600K

Страница 1: ...Performance on the 2nd Generation Intel Core processor family January 2011 White Paper Vinodh Gopal Jim Guilford Wajdi Feghali Erdinc Ozturk Gil Wolrich Kirk Yap Sean Gulley Martin Dixon IA Architect...

Страница 2: ...e net result is an improvement in cryptographic performance up to 1 8X over the previous Intel processors1 The Intel Embedded Design Center provides qualified developers with web based access to techn...

Страница 3: ...Cryptographic Performance on the 2nd Generation Intel Core processor family 3 and the embedded community Design Fast Design Smart Get started today www intel com embedded edc...

Страница 4: ...ocessor family 4 Contents Overview 5 Improving Cryptographic Processing 5 Multi Buffer via SIMD 6 Multi Buffer via Data Dependency Hiding 6 Performance 7 Private Key and Secure Hashing Performance 8 P...

Страница 5: ...the RSA DSA and Diffie Hellman algorithms In 3 we demonstrate the fastest implementation of modular exponentiation on Intel processors The 2nd Generation Intel Core processor family improves the perf...

Страница 6: ...ntel AVX Intel Advanced Vector Extensions instruction set 5 resulting in much faster multi buffer hashing Although we process the same number of buffers as with SSE we gain some performance efficiency...

Страница 7: ...ded keys AES using 128 bit keys is a common usage the results will be similar and scale for other key sizes such as 192 and 256 bit keys The modular exponentiation code bases were measured on 512 bit...

Страница 8: ...2 bit Modular Exponentiation 360 880 246 899 1 46 1024 bit Modular Exponentiation 2 722 590 1 906 555 1 43 In this case we observe a large performance boost with the Intel Core i7 2600 processor based...

Страница 9: ...erence http softwarecommunity intel com isn downloads intelavx Intel AVX Programming Reference 31943302 pdf The Intel Embedded Design Center provides qualified developers with web based access to tech...

Страница 10: ...Gopal Jim Guilford Erdinc Ozturk Gil Wolrich Wajdi Feghali Kirk Yap Sean Gulley and Martin Dixon are IA Architects with the IAG Group at Intel Corporation Acronyms IA Intel Architecture API Applicati...

Страница 11: ...tem Performance will vary depending on the specific hardware and software you use For more information including details on which processors support HT Technology see here 64 bit computing on Intel ar...

Отзывы: