RSA intrinsics [Was: RFR(L): 8069539: RSA acceleration]
Andrew Haley
aph at redhat.com
Thu Jun 4 18:41:53 UTC 2015
On 04/06/15 19:32, Anthony Scarpino wrote:
> On 06/04/2015 10:08 AM, Andrew Haley wrote:
>> I'm sorry this is a rather long email, and I pray for your patience.
>>
>> I'm getting close to something I can put forward for review. The
>> performance is encouraging.
>>
>> [ Some background: The kernel of RSA and Diffie-Hellman key exchange
>> is Montgomery multiplication. Optimizing RSA basically comes down to
>> optimizing Montgomery multiplication. The core of OpenJDK's RSA is
>> BigInteger.oddModPow(). ]
>>
>> My Montgomery multiply routine (mostly portable C, with a small
>> assembly-language insert) executes a 1024-bit multiply/reduce in about
>> 2000ns; the hand-coded assembly language equivalent in OpenSSL is
>> faster (as you'd expect) but not very much faster: about 1700ns. In
>> other words, compiled C is only about 20% slower.
>>
>> Firstly, this is pretty remarkable performance by GCC (Yay! Go GCC!)
>> and it shows I'm on the right track. It also shows that there isn't a
>> huge amount to be gained by hand-coding Montgomery multiplication, but
>> anybody who fancies their hand can try to improve on GCC. This is
>> also very nice because porting it to non-x86 hardware is fairly
>> straightforward -- certainly far easier than writing a large assembly-
>> language routine.
>
> I'm sure when I see the code it will become clearer, but I'm guessing
> you are taking a C version of Montgomery multiply, using GCC to turn it
> into assembly with some cpu acceleration instructions and putting that
> into an intrinsic?
I have written a Montgomery multiply routine: it is mostly C, with a
tiny bit (really, just a few instructions) of inline assembly
language. It's called from a HotSpot intrinsic.
>> It would be nice to keep all of the data in an array of jlongs for the
>> duration of oddModPow(). Here's one idea: I could write a version of
>> oddModPow() which is guaranteed never to use the Java version of the
>> Montgomery multiply. This would use a JNI method which calls the
>> native Montgomery multiply routine, guaranteeing that that we always
>> use that native routine, even from the interpreter and C1. Then I
>> could keep all the internal state in native word order, and all this
>> word-swapping would just go away. This would have the additional
>> benefit that it would be faster when using the interpreter and C1.
>> So, we'd have two versions of oddModPow() in BigInteger, and switch
>> between them depending on whether the platform had support for a
>> native Montgomery multiplication.
>
> I'm assuming the JNI method is closer to OpenSSL numbers?
It's the same Montgomery multiplication as the intrinsic, but called
from a JNI method instead of a HotSpot intrinsic.
>> The downside of having two versions of oddModPow() would, of course,
>> be some code duplication.
>>
>> Or am I just making too much fuss about this? Maybe I should be happy
>> with what I've got.
>
> Looking at the 2k RSA sign numbers 2.3x better after your patch vs
> hs-comp. I'd be happy with that improvement.
OK. I kinda guessed that would be the response, really.
Andrew.
More information about the hotspot-compiler-dev
mailing list