PKEY CMAC timings

Dr Paul Dale paul.dale at oracle.com
Thu Jun 18 07:08:58 UTC 2020


I honestly believe that the various contexts should be reusable.
Without this, the recent provider additions will impose a significant overhead.

Pauli
-- 
Dr Paul Dale | Distinguished Architect | Cryptographic Foundations 
Phone +61 7 3031 7217
Oracle Australia




> On 18 Jun 2020, at 4:27 pm, Richard Levitte <levitte at openssl.org> wrote:
> 
> I think 16k was enough to demonstrate that the timing difference
> becomes more marginal the larger the amount of data to encrypt in the
> same session is.
> 
> This makes me think that we might want to rethink the reset functions,
> i.e. the likes of EVP_CIPHER_CTX_reset()...  could we change that
> function to become a call down to provider code?  We do allow that for
> the non-provider back-ends, they can implement a 'cleanup' function.
> Right now, EVP_CIPHER_CTX_reset() just calls the provider's function
> to free its operation context, which forces us to re-initialize
> everything with a restarted session, i.e. pass the key anew, etc etc
> etc.
> 
> Cheers,
> Richard
> 
> On Thu, 18 Jun 2020 06:50:45 +0200,
> Hal Murray wrote:
>> 
>>> How does it look for large input?  As in many kilobytes or megabytes?
>> 
>> 16K is all I was willing to wait for.  Timing for really long blocks turns 
>> into a memory test.  The right unit is ns/byte.  If that's an interesting 
>> case, I'll hack some code to do longer blocks.
> pp> 
>> 1.1.1g
>>     AES-128  16 48 16    225   0.225  475ac1c053379e7dbd4ce80b87d2178e
>>     AES-128  16 1024 16   1682   1.682  159d6d5c13f35d37c72efc5f6dbf40ad
>>     AES-128  16 16384 16  24566  24.566  581f7b133ad6f3697f33c3f836fdb6e6
>> 
>> 3.0.0 alpha3
>>     AES-128  16 48 16    496   0.496  475ac1c053379e7dbd4ce80b87d2178e
>>     AES-128  16 1024 16   1953   1.953  159d6d5c13f35d37c72efc5f6dbf40ad
>>     AES-128  16 16384 16  24820  24.820  581f7b133ad6f3697f33c3f836fdb6e6
>> 
>> -----------
>> 
>> 3.0.0 alpha3:
>> CMAC
>>     AES-128  16 16384 16  25270  25.270  581f7b133ad6f3697f33c3f836fdb6e6
>> PKEY
>>     AES-128  16 16384 16  24839  24.839  581f7b133ad6f3697f33c3f836fdb6e6
>> EVP_MAC
>>     AES-128  16 16384 16  25462  25.462  581f7b133ad6f3697f33c3f836fdb6e6
>> EVP_MAC with Preload cipher and key
>>     AES-128  16 16384 16  24567  24.567  581f7b133ad6f3697f33c3f836fdb6e6
>> 
>> 
>> 
>> -- 
>> These are my opinions.  I hate spam.
>> 
>> 
>> 
> -- 
> Richard Levitte         levitte at openssl.org
> OpenSSL Project         http://www.openssl.org/~levitte/

-------------- next part --------------
An HTML attachment was scrubbed...
URL: <https://mta.openssl.org/pipermail/openssl-users/attachments/20200618/5171372c/attachment.html>


More information about the openssl-users mailing list