Cryptographic Performance on the
2nd Generation Intel® Core™ processor family
8
Private-Key and Secure Hashing Performance
The multi-buffer performance is shown below in Table 1:
Table 1. Multi-Buffer Performance (Cycles/Byte)
Algorithm
i5-650
i7-2600
i7-2600 Gain
MD5
1.46
1.27
1.15
SHA1
2.96
2.2
1.35
SHA256
6.96
5.27
1.32
AES128-CBC-Encrypt
1.52
0.83
1.83
In all cases, we observe a large performance boost with the Intel® Core™ i7-
2600 processor
based on the
2
nd
Generation Intel® Core™ processor family,
with gains ranging from 1.15-1.83X. The absolute performance is very
impressive as well, with 0.83 cycles/byte for AES128 and 2.2 cycles/byte
for SHA1.
Public Key Encryption Performance
The Public Key results are shown below in Table 2:
Table 2. Modular Exponentiation Performance (Cycles)
2
Algorithm
i5-650
i7-2600
i7-2600 Gain
512-bit Modular Exponentiation
360,880
246,899
1.46
1024-bit Modular Exponentiation 2,722,590 1,906,555
1.43
In this case, we observe a large performance boost with the Intel® Core™ i7-
2600 processor
based on the
2
nd
Generation Intel® Core™ processor family of
~1.4X. The absolute performance of exponentiation is very impressive, with
just 246,899 cycles for a 512-bit constant-time modular exponentiation.
2
Software and workloads used in performance tests may have been optimized for performance
only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are
measured using specific computer systems, components, software, operations and functions.
Any change to any of those factors may cause the results to vary. You should consult other
information and performance tests to assist you in fully evaluating your contemplated
purchases, including the performance of that product when combined with other products.
Configuration: Refer to the Performance section. For more information go to