3 software cryptographic api performance – Intel AS/400 RISC Server User Manual

Page 144

Advertising
background image

8.3 Software Cryptographic API Performance

This section provides performance information for System i systems using the following cryptographic
services; i5/OS Cryptographic Services API and IBM JCE 1.2.1, an extension of JDK 1.4.2.

Cryptographic performance is an important aspect of capacity planning, particularly for applications using
secure network communications. The information in this section may be used to assist in capacity
planning for this complex environment.

Measurement Results

The cryptographic performance measurements in the following three tables were made using i5/OS
Cryptographic Services API and Java Cryptography Extension.

Notes:
y

See section 8.2 for Test Environment Information

n/a

35

n/a

165

100

2048

10

RSA

n/a

246

n/a

1,187

100

1024

10

RSA

n/a

30

n/a

128

100

2048

1

RSA

n/a

197

n/a

897

100

1024

1

RSA

27,183,773

415

82,392,038

1,257

65536

256

10

AES

27,824,575

27,172

28,005,446

27,349

1024

256

10

AES

34,350,709

524

110,892,831

1,692

65536

128

10

AES

35,754,190

34,916

31,137,523

30,408

1024

128

10

AES

22,614,607

345

72,782,397

1,111

65536

256

1

AES

23,313,526

22,767

24,601,428

24,025

1024

256

1

AES

28,080,038

428

96,930,853

1,479

65536

128

1

AES

28,784,259

28,110

27,275,585

26,636

1024

128

1

AES

54,321,919

207

266,579,889

1,017

262144

128

10

RC4

32,704,635

125

248,224,207

947

262144

128

1

RC4

7,657,551

117

7,139,814

109

65536

112

10

Triple DES

7,697,917

7,517

6,783,658

6,625

1024

112

10

Triple DES

6,086,464

93

5,710,925

87

65536

112

1

Triple DES

6,140,893

5,997

5,159,756

5,039

1024

112

1

Triple DES

20,241,955

19,768

15,771,656

15,402

1024

56

10

DES

15,909,515

15,537

11,547,058

11,276

1024

56

1

DES

JCE (Bytes/

Second)

JCE

(Transactions

/Second)

i5/OS (Bytes/

Second)

i5/OS

(Transactions/

Second)

Transaction

Length
(Bytes)

Key Length

(Bits)

Threads

Encryption

Algorithm

Cipher Encrypt Performance

Table 8.1

IBM i 6.1 Performance Capabilities Reference - January/April/October 2008

©

Copyright IBM Corp. 2008

Chapter 8 Cryptography Performance

144

Advertising
This manual is related to the following products: