sign verify sign/s verify/s
160 bits ecdsa (secp160r1) 0.0602s 0.0002s 16.6 6173.8
192 bits ecdsa (nistp192) 0.0603s 0.0002s 16.6 5192.3
224 bits ecdsa (nistp224) 0.0361s 0.0001s 27.7 10142.3
256 bits ecdsa (nistp256) 0.0362s 0.0001s 27.6 17669.3
384 bits ecdsa (nistp384) 0.0723s 0.0006s 13.8 1633.6
521 bits ecdsa (nistp521) 0.0722s 0.0004s 13.9 2248.3
163 bits ecdsa (nistk163) 0.1085s 0.1685s 9.2 5.9
233 bits ecdsa (nistk233) 0.1083s 0.1687s 9.2 5.9
283 bits ecdsa (nistk283) 0.1446s 0.2535s 6.9 3.9
409 bits ecdsa (nistk409) 0.1688s 0.2547s 5.9 3.9
571 bits ecdsa (nistk571) 0.2170s 0.3373s 4.6 3.0
163 bits ecdsa (nistb163) 0.1083s 0.1685s 9.2 5.9
233 bits ecdsa (nistb233) 0.1084s 0.1685s 9.2 5.9
283 bits ecdsa (nistb283) 0.1447s 0.2533s 6.9 3.9
409 bits ecdsa (nistb409) 0.1447s 0.2535s 6.9 3.9
571 bits ecdsa (nistb571) 0.2183s 0.3397s 4.6 2.9
256 bits ecdsa (brainpoolP256r1) 0.0750s 0.0003s 13.3 3233.3
256 bits ecdsa (brainpoolP256t1) 0.0722s 0.0003s 13.8 3424.2
384 bits ecdsa (brainpoolP384r1) 0.0784s 0.0006s 12.8 1568.4
384 bits ecdsa (brainpoolP384t1) 0.0807s 0.0006s 12.4 1616.4
512 bits ecdsa (brainpoolP512r1) 0.1260s 0.0009s 7.9 1099.5
512 bits ecdsa (brainpoolP512t1) 0.1217s 0.0009s 8.2 1145.8
sign verify sign/s verify/s
160 bits ecdsa (secp160r1) 0.0002s 0.0002s 5647.2 6373.2
192 bits ecdsa (nistp192) 0.0002s 0.0002s 4615.2 5454.1
224 bits ecdsa (nistp224) 0.0000s 0.0001s 23426.6 10324.7
256 bits ecdsa (nistp256) 0.0000s 0.0001s 56006.9 17959.7
384 bits ecdsa (nistp384) 0.0008s 0.0006s 1232.2 1603.7
521 bits ecdsa (nistp521) 0.0002s 0.0004s 4459.7 2267.3
163 bits ecdsa (nistk163) 0.0002s 0.0004s 5197.9 2623.8
233 bits ecdsa (nistk233) 0.0003s 0.0005s 3955.0 1970.9
283 bits ecdsa (nistk283) 0.0004s 0.0009s 2279.9 1161.7
409 bits ecdsa (nistk409) 0.0007s 0.0014s 1393.4 705.1
571 bits ecdsa (nistk571) 0.0016s 0.0031s 636.6 327.7
163 bits ecdsa (nistb163) 0.0002s 0.0004s 5016.9 2526.3
233 bits ecdsa (nistb233) 0.0003s 0.0005s 3770.0 1901.2
283 bits ecdsa (nistb283) 0.0005s 0.0009s 2146.1 1091.5
409 bits ecdsa (nistb409) 0.0008s 0.0015s 1331.9 662.1
571 bits ecdsa (nistb571) 0.0017s 0.0033s 594.1 303.6
256 bits ecdsa (brainpoolP256r1) 0.0004s 0.0003s 2817.0 3260.6
256 bits ecdsa (brainpoolP256t1) 0.0004s 0.0003s 2826.7 3416.7
384 bits ecdsa (brainpoolP384r1) 0.0008s 0.0007s 1221.2 1521.0
384 bits ecdsa (brainpoolP384t1) 0.0008s 0.0006s 1237.2 1625.6
512 bits ecdsa (brainpoolP512r1) 0.0012s 0.0009s 849.0 1120.6
512 bits ecdsa (brainpoolP512t1) 0.0012s 0.0009s 863.5 1157.5
sign verify sign/s verify/s
rsa 512 bits 0.001310s 0.000002s 763.4 497291.4
rsa 1024 bits 0.002276s 0.000005s 439.4 210108.0
rsa 2048 bits 0.005608s 0.000015s 178.3 67992.1
rsa 3072 bits 0.007852s 0.000031s 127.4 32670.9
rsa 4096 bits 0.011690s 0.000053s 85.5 18883.7
rsa 7680 bits 0.045893s 0.000179s 21.8 5574.2
rsa 15360 bits 0.177018s 0.000703s 5.6 1422.5
sign verify sign/s verify/s
rsa 512 bits 0.000031s 0.000002s 32198.8 500672.7
rsa 1024 bits 0.000072s 0.000005s 13899.2 212840.1
rsa 2048 bits 0.000508s 0.000015s 1969.0 68025.8
rsa 3072 bits 0.001536s 0.000031s 651.0 32676.3
rsa 4096 bits 0.003472s 0.000053s 288.0 18864.9
rsa 7680 bits 0.032468s 0.000182s 30.8 5499.6
rsa 15360 bits 0.166066s 0.000710s 6.0 1408.9
op op/s
160 bits ecdh (secp160r1) 0.0242s 41.3
192 bits ecdh (nistp192) 0.0242s 41.4
224 bits ecdh (nistp224) 0.0001s 16000.6
256 bits ecdh (nistp256) 0.0000s 23523.5
384 bits ecdh (nistp384) 0.0362s 27.6
521 bits ecdh (nistp521) 0.0003s 3881.2
163 bits ecdh (nistk163) 0.0730s 13.7
233 bits ecdh (nistk233) 0.0722s 13.8
283 bits ecdh (nistk283) 0.1084s 9.2
409 bits ecdh (nistk409) 0.1085s 9.2
571 bits ecdh (nistk571) 0.1451s 6.9
163 bits ecdh (nistb163) 0.0724s 13.8
233 bits ecdh (nistb233) 0.0723s 13.8
283 bits ecdh (nistb283) 0.1083s 9.2
409 bits ecdh (nistb409) 0.1093s 9.1
571 bits ecdh (nistb571) 0.1452s 6.9
256 bits ecdh (brainpoolP256r1) 0.0360s 27.8
256 bits ecdh (brainpoolP256t1) 0.0356s 28.1
384 bits ecdh (brainpoolP384r1) 0.0438s 22.8
384 bits ecdh (brainpoolP384t1) 0.0464s 21.5
512 bits ecdh (brainpoolP512r1) 0.0546s 18.3
512 bits ecdh (brainpoolP512t1) 0.0557s 17.9
253 bits ecdh (X25519) 0.0000s 34791.5
448 bits ecdh (X448) 0.0004s 2534.0
op op/s
160 bits ecdh (secp160r1) 0.0002s 5833.6
192 bits ecdh (nistp192) 0.0002s 4774.5
224 bits ecdh (nistp224) 0.0001s 15854.2
256 bits ecdh (nistp256) 0.0000s 23544.5
384 bits ecdh (nistp384) 0.0008s 1282.1
521 bits ecdh (nistp521) 0.0003s 3844.2
163 bits ecdh (nistk163) 0.0002s 5375.9
233 bits ecdh (nistk233) 0.0002s 4128.9
283 bits ecdh (nistk283) 0.0004s 2324.7
409 bits ecdh (nistk409) 0.0007s 1440.2
571 bits ecdh (nistk571) 0.0015s 673.5
163 bits ecdh (nistb163) 0.0002s 5269.6
233 bits ecdh (nistb233) 0.0003s 3948.4
283 bits ecdh (nistb283) 0.0005s 2210.9
409 bits ecdh (nistb409) 0.0007s 1366.7
571 bits ecdh (nistb571) 0.0016s 624.0
256 bits ecdh (brainpoolP256r1) 0.0003s 2947.3
256 bits ecdh (brainpoolP256t1) 0.0003s 2946.0
384 bits ecdh (brainpoolP384r1) 0.0008s 1273.2
384 bits ecdh (brainpoolP384t1) 0.0008s 1291.0
512 bits ecdh (brainpoolP512r1) 0.0011s 883.5
512 bits ecdh (brainpoolP512t1) 0.0011s 893.0
253 bits ecdh (X25519) 0.0000s 34926.5
448 bits ecdh (X448) 0.0004s 2563.0
type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes 16384 bytes
aes-128 cbc 273511.40k 286767.53k 288448.00k 290258.94k 290867.88k 290510.17k
aes-192 cbc 237013.42k 247024.09k 248238.42k 249730.05k 250022.57k 249643.01k
aes-256 cbc 209539.56k 216890.99k 217929.90k 219320.66k 219207.00k 219419.99k
type 16 bytes 64 bytes 256 bytes 1024 bytes 8192 bytes 16384 bytes
aes-128 cbc 273903.99k 286951.68k 288592.21k 290188.97k 291173.72k 291012.61k
aes-192 cbc 237594.21k 247290.11k 248158.12k 249358.68k 250109.95k 250276.52k
aes-256 cbc 209598.70k 217108.18k 218136.92k 218882.73k 219368.11k 219196.07k
消除以往外部網路與內部網路的區別。也就是説,所有的流量都是untrust。內部資安人員應該對所有流量進行檢查與log並實行access control。 攻擊型態的轉變 2010年時一架飛機上載著10名看似正常不過且彼此互不認識的民眾——其中有人甚至幫微軟測試過軟體——從紐約飛往維也納,但他們的真實身份其實為俄羅斯間諜,且已保持著非常普通的狀態數年之久。他們努力的與美國具影響力的人物混熟,並向俄羅斯秘密發送獲取到的訊息。 從這個例子來說,現代的攻擊型態、週期已經拉長,駭客的攻擊手法已經變為"low and slow",也就是花漫長的時間搜集許多我們並不會特別留意的網路資料,整個時間會拉長到數月或著數年不等。且不同於以往的大範圍找尋可下手的目標,現代駭客的攻擊範圍只會越來越窄、越來越具針對性,特別是那些具有高價值的系統或資訊。 The Philip Cummings Problem Philip Cummings在一家為數個徵信所提供軟體的公司上班,其中與奈及利亞的犯罪集團合作,將客戶的信用資料轉給該集團。
Oct 1, 2022Hyper-V 使用Windows原生的hyper-v虛擬平台,可以建立具有TPM module、支援secure boot的虛擬機,並且也可以安裝windows11。 安裝步驟 Prerequisites 首先我們需要啟用hyper-v的功能,進入控制台->程式集->開啟或關閉windows功能->勾選Hyper-V選項。 接著我們可以到臺大計算機中心下載學校提供的WIN11 ISO檔,為等一下的虛擬機器安裝做準備(請注意要在臺大的網域下。)。 https://download.cc.ntu.edu.tw/download.php 以及認證用的KMS腳本。
Sep 11, 2022Group Policy setting Windows10、Windows11中可以使用Group Policy Setting來設定Windows系統對於TPM的使用方式。 我們可以按下windows鍵+R,並輸入:gpedit.msc,即可打開Group Policy Setting。 接著轉至:系統管理範本->系統->可信賴平台模組服務,便可設定windows系統對於TPM的原則。 The Level of TPM owner authorization information available to the operating system 此設定可以調整Windows會使用TPM來進行哪些特定行為。越高的層級,允許使用TPM的行為就越多。例如:
Aug 11, 2022Task Specification In this note, I was trying to figure out several questions, including: Is my laptop (macbook air 2020) support TPM? And if so is it TPM 2.0? what functions can be done with my computer's TPM module? What are the algorithms it uses? Where does it store the key? What should be done when user forget the key? Can TPM increase the performance of "data in motion"?
Jul 27, 2022or
By clicking below, you agree to our terms of service.
New to HackMD? Sign up