Bummer! This is just a preview. You need to be signed in with an account to view the entire instruction.
Well done!
You have completed (UPI) Chapter 16: Emerging Technologies in Cybersecurity!
You have completed (UPI) Chapter 16: Emerging Technologies in Cybersecurity!
Instruction
16.5.2 Evaluation of the Effective Key Throughput
In this section, we evaluate the effective (peak) key throughput. Figure 10 plots the median of each RBC cryptosystem's effective key throughput on a logarithmic scale. The AES256 implementation, aided by AES-NI, ran several orders of magnitude more efficiently than the public key cryptography variants, achieving 2.17 × 10^8 keys per second. ECC Secp256r1 performed the second slowest at 4.77 ...