Abstract
Most benchmarking of cryptographic systems focuses on the performance of individual algorithms in a standalone setting. However, real-world applications such as the Transport Layer Security (TLS) protocol use a variety of cryptographic algorithms together. Benchmarking the performance of a web server using TLS is a more complex task, so fewer works include performance characteristics of full systems. In this work, we develop a model for the number of connections per second of a TLS-protected web server based on the runtime of individual cryptographic operations. Our model allows us to predict how performance scales with file size. Our model also allows us to predict the impact of improved key exchange algorithms: for example, on an HTTPS server with 1KiB files running ECDSA-nistp256 with AES-128-GCM and HMAC-SHA-256, a 2× improvement in ephemeral Diffie-Hellman key exchange performance only leads to a 10% improvement in connections per second, as signatures become the dominant cost.
Original language | English |
---|---|
Title of host publication | Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2016 |
Editors | Xun Yi, Giovanni Russello |
Place of Publication | Nw York NY USA |
Publisher | Association for Computing Machinery (ACM) |
Number of pages | 4 |
ISBN (Electronic) | 9781450340427 |
DOIs | |
Publication status | Published - 2016 |
Externally published | Yes |
Event | Australian Information Security Conference 2016 - Canberra, Australia Duration: 2 Feb 2016 → 5 Feb 2016 https://dl.acm.org/doi/proceedings/10.1145/2843043 (Proceedings) https://cs.anu.edu.au/conf/acsw2016/sub-confs/aisc.html (Website) |
Publication series
Name | ACM International Conference Proceeding Series |
---|---|
Publisher | Association for Computing Machinery (ACM) |
Volume | 01-05-February-2016 |
Conference
Conference | Australian Information Security Conference 2016 |
---|---|
Abbreviated title | AISC 2016 |
Country/Territory | Australia |
City | Canberra |
Period | 2/02/16 → 5/02/16 |
Internet address |
Keywords
- Key exchange
- Performance
- Transport Layer Security (TLS) protocol