We're sorry but this page doesn't work properly without JavaScript enabled. Please enable it to continue.
Feedback

Mathematics and development of fast TLS handshakes

Formal Metadata

Title
Mathematics and development of fast TLS handshakes
Title of Series
Number of Parts
637
Author
License
CC Attribution 2.0 Belgium:
You are free to use, adapt and copy, distribute and transmit the work or content in adapted or unchanged form for any legal purpose as long as the work is attributed to the author in the manner specified by the author or licensor.
Identifiers
Publisher
Release Date
Language

Content Metadata

Subject Area
Genre
Abstract
Tempesta TLS is an implementation of TLS handshakes for the Linux kernel. Since the kernel already provides symmetric ciphers, we focus on asymmetric cryptography only, elliptic curves in particular. Use used the mbed TLS library as the foundation and almost fully rewrote it to make is x40 faster. During our development we also use parts of WolfSSL library. While WolfSSL outperforms OpenSSL, it uses the same algorithms, which are 5-7 years of old. Tempesta TLS uses newer and more efficient algorithms from the modern cryptography research. While we still improving performance of Tempesta TLS, the implementation already establishes 40-80% more TLS handshakes per second than OpenSSL/Nginx and provides up to x4 lower latency in several tests. This talk covers following topics with plenty of benchmarks: - The fundamentals of elliptic curve computations and the most "hot spots" - Side channel attacks (SCA) and methods to prevent them - How the recent CPU vulnerabilities impact TLS handshakes - Basics of the new fast algorithms used in the Tempesta TLS - The design trade offs in OpenSSL, WolfSSL, mbed TLS, and Tempesta TLS - The funny assembly code with is more straightforward than C