Nikos Mavrogiannopoulos <[email protected]> writes:

> I've also done a comparison benchmark of AES-GCM (the 4-bit table one)
> versus HMAC-SHAx+AES-CBC... AES-GCM in software is disappointing...

Now I've tried 8-bit tables. Then I get into the same ballpark as md5
and the sha functions (benchmarking on intel x86_64):

         Algorithm        mode Mbyte/s cycles/byte cycles/block
               md5      update  174.20        7.12       455.48
              sha1      update  158.09        7.84       501.89
            sha256      update   68.36       18.14      1160.65
            sha512      update  104.99       11.81      1511.55
              gmac        auth   65.93       18.80       300.87

I think both sha512 and gmac benefit from 64-bit wide registers, while
md5, sha1 and sha256 does not. And I think there are still a couple of
microoptimizations left to do for gmac.

(I'm only benchmarking gmac; the encryption should be about the same as
AES in ECB or CTR mode, which is roughly 17 cycles/byte on the same
hardware).

Now the question is if it's a good tradeoff to expand the key to a 4 KB
table.

BTW, I hadn't noticed before that sha512 is faster per byte than sha256.

Regards,
/Niels

-- 
Niels Möller. PGP-encrypted email is preferred. Keyid C0B98E26.
Internet email is subject to wholesale government surveillance.
_______________________________________________
nettle-bugs mailing list
[email protected]
http://lists.lysator.liu.se/mailman/listinfo/nettle-bugs

Reply via email to