RFR(L): 8069539: RSA acceleration
Sergey Kuksenko
sergey.kuksenko at oracle.com
Fri Mar 13 13:30:36 UTC 2015
Fine Sandhya,
Besides SPECjvm2008 I did quick test on microbenchmarks.
Draft results (on Haswell):
BigInteger.modPow speedup - 40-50%
BigInteger.nextProbablyPrime - 35%
BigInteger.pow - 20-25%
BigInteger.TEN.pow() - up to 35% speedup
(I checked this because of BigInteger.TEN pows frequently used in
BigDecimal)
And even "new BigDecimal(double)" - got 8%-10% speedup.
Later I will provide more precise (and verified) results.
On 03/12/2015 12:36 AM, Viswanathan, Sandhya wrote:
> Hi All,
>
> We would like to contribute the Crypto RSA acceleration optimization
> from Intel.
>
> The contribution is towards the JEP 8046943 and Bug ID: 8069539.
>
> Please review this patch:
>
> JEP: https://bugs.openjdk.java.net/browse/JDK-8046943
>
> Bug-id: https://bugs.openjdk.java.net/browse/JDK-8069539
>
> webrev: https://bugs.openjdk.java.net/secure/attachment/26024/webrev.zip
>
> The optimization is achieved through intrinsics for BigInteger
> squareToLen and mulAdd methods.
>
> We see ~50% improvement for SPECjvm2008 crypto.rsa with this patch.
>
> Nils Eliasson has kindly offered to sponsor this patch.
>
> Best Regards,
>
> Sandhya
>
--
Best regards,
Sergey Kuksenko
More information about the hotspot-compiler-dev
mailing list