At that point it is very much dependent on the implementation. Obviously not all runtimes do get direct support for these constructions. Both are also available on later AMD processors because of the cross licensing agreements between those firms. Likewise, the Intel SHA extensions for later CPU's can also be found there. See for AES the AES-NI page on Wikipedia. Both AES and SHA-2 performance can be enhanced using CPU constructions. With regard to the leading CPU architecture for PC's, there are the Intel whitepapers. Furthermore, it depends on the runtime environment that contains the hash and cipher implementations. Which MAC algorithm is faster - CBC based MAC's or HMAC - depends completely on which ciphers and hashes are used.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |