From: | Bruce Momjian <bruce(at)momjian(dot)us> |
---|---|
To: | Miles Elam <mileselam+postgresql(at)gmail(dot)com> |
Cc: | pgsql-docs(at)postgresql(dot)org |
Subject: | Re: pgcrypto docs |
Date: | 2013-12-04 17:42:08 |
Message-ID: | 20131204174208.GF17114@momjian.us |
Views: | Raw Message | Whole Thread | Download mbox | Resend email |
Thread: | |
Lists: | pgsql-docs |
On Tue, May 7, 2013 at 03:47:43PM -0700, Miles Elam wrote:
> Personally I've found the relative times instructive, merely outdated. Perhaps
> using md5 as a baseline and evaluating estimates relative to that baseline?
>
> md5 = 1
> sha1 = 4
> crypt-des = 7
> crypt-md5 = 1,000
> crypt-bf/5 = 12,500
> crypt-bf/6 = 25,000
> crypt-bf/7 = 50,000
> crypt-bf/8 = 100,000
>
> This way, with the caveat that performance will vary from machine to machine,
> there is a sense of the relative costs of using each algorithm, which does not
> change as wildly with time. It lets people know how bad md5 and sha1 are for
> protecting passwords et al. It also demonstrates that each turn of blowfish in
> this module effectively doubles the time needed to crack and halves the number
> of hashes one can perform.
>
> In short, I'd hate for the baby to be thrown out with the bathwater.
I have used your new testing times, plus added these relative
measurements, which shoud give us the best of both worlds. Patch
attached; you can see the results here:
http://momjian.us/tmp/pgsql/pgcrypto.html
What speed was the I5 CPU you used?
--
Bruce Momjian <bruce(at)momjian(dot)us> http://momjian.us
EnterpriseDB http://enterprisedb.com
+ Everyone has their own god. +
Attachment | Content-Type | Size |
---|---|---|
crypto_timing.diff | text/x-diff | 4.0 KB |
From | Date | Subject | |
---|---|---|---|
Next Message | Bruce Momjian | 2013-12-06 14:47:59 | Re: Data Partition Encryption documentation |
Previous Message | Bruce Momjian | 2013-12-04 15:03:57 | Re: readability tutorial example in pdf |