On Mon, Jan 06, 2025 at 08:00:04AM +0000, Kris Kwiatkowski wrote:
> On 06/01/2025 06:18, Viktor Dukhovni wrote:
> > it would be very unlikey to get
> > used.
> The addition of that codepoint was previously discussed on this mailing
> list, and as Victor says,
> it is unlikely to be used.
Sure, but for the record the same applies to SecP3841MLKEM1024, which is
slower still and also not especially compelling. A more complete table:
keygen encaps decaps keygens/s encaps/s
decaps/s
ML-KEM-768 0.000027s 0.000017s 0.000027s 36852.5 57951.3
36580.9
ML-KEM-1024 0.000042s 0.000023s 0.000036s 23865.3 43257.8
27478.9
X25519MLKEM768 0.000054s 0.000071s 0.000056s 18638.2 14051.3
17725.6
SecP256r1MLKEM768 0.000042s 0.000076s 0.000075s 23747.7 13224.7
13406.0
X448MLKEM1024 0.000226s 0.000337s 0.000172s 4427.6 2967.8
5807.0
SecP384r1MLKEM1024 0.000690s 0.001292s 0.000674s 1449.2 773.9
1483.9
Though it looks a bit better with the GCC 128-bit arithmetic
optimisations (OpenSSL's "enable-ec_nistp_64_gcc_128") enabled:
SecP384r1MLKEM1024 0.000176s 0.000495s 0.000362s 5673.4 2022.1
2763.8
--
Viktor.
_______________________________________________
TLS mailing list -- [email protected]
To unsubscribe send an email to [email protected]