RFR(L): 8069539: RSA acceleration

Viswanathan, Sandhya sandhya.viswanathan at intel.com
Fri Mar 13 20:55:03 UTC 2015


Hi Sergey,

Thanks for these performance numbers. It is very encouraging!

Best Regards,
Sandhya

-----Original Message-----
From: Sergey Kuksenko [mailto:sergey.kuksenko at oracle.com] 
Sent: Friday, March 13, 2015 6:31 AM
To: Viswanathan, Sandhya; hotspot-compiler-dev at openjdk.java.net
Subject: Re: RFR(L): 8069539: RSA acceleration

Fine Sandhya,

Besides SPECjvm2008 I did quick test on microbenchmarks.
Draft results (on Haswell):
BigInteger.modPow speedup    -  40-50%
BigInteger.nextProbablyPrime -  35%
BigInteger.pow               -  20-25%

BigInteger.TEN.pow()         - up to 35% speedup
(I checked this because of BigInteger.TEN pows frequently used in 
BigDecimal)

And even "new BigDecimal(double)" - got 8%-10% speedup.

Later I will provide more precise (and verified) results.

On 03/12/2015 12:36 AM, Viswanathan, Sandhya wrote:
> Hi All,
>
> We would like to contribute the Crypto RSA acceleration optimization
> from Intel.
>
> The contribution is towards the JEP 8046943 and Bug ID:  8069539.
>
> Please review this patch:
>
> JEP: https://bugs.openjdk.java.net/browse/JDK-8046943
>
> Bug-id: https://bugs.openjdk.java.net/browse/JDK-8069539
>
> webrev: https://bugs.openjdk.java.net/secure/attachment/26024/webrev.zip
>
> The optimization is achieved through intrinsics for BigInteger
> squareToLen and mulAdd methods.
>
> We see ~50% improvement for SPECjvm2008 crypto.rsa with this patch.
>
> Nils Eliasson has kindly offered to sponsor this patch.
>
> Best Regards,
>
> Sandhya
>

-- 
Best regards,
Sergey Kuksenko


More information about the hotspot-compiler-dev mailing list