Skip to content

Performance Evaluation of SHA-256 using SHA New Instructions.

License

Notifications You must be signed in to change notification settings

niconiconi/flo-shani-aesni

 
 

Folders and files

NameName
Last commit message
Last commit date

Latest commit

 

History

32 Commits
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Repository files navigation

FLO-SHANI-AESNI

This project showcase the performance of cryptographic algorithms accelerated using special hardware instructions, such as SHA-NI and AES-NI.

This source code is part of the research work titled: "SoK: A Performance Evaluation of Cryptographic Instruction Sets on Modern Architectures" by the authors:

Research Resources

A peer-reviewed paper will be presented in the The 5th ACM ASIA Public-Key Cryptography Workshop (APKC2018).

To cite this work use:

@inproceedings{faz_apkc2018,
    author    = {Faz-Hernandez, Armando and L\'{o}pez, Julio and 
	             de~Oliveira, Ana Karina D. S.},
    title     = {SoK: A Performance Evaluation of Cryptographic 
	             Instruction Sets on Modern Architectures},
    booktitle = {Proceedings of the 5th ACM on ASIA Public-Key 
	             Cryptography Workshop},
    series    = {APKC '18},
    year      = {2018},
    isbn      = {978-1-4503-5756-2},
    location  = {Incheon, Republic of Korea},
    pages     = {9--18},
    numpages  = {10},
    url       = {http://doi.acm.org/10.1145/3197507.3197511},
    doi       = {10.1145/3197507.3197511},
    acmid     = {3197511},
    publisher = {ACM},
    address   = {New York, NY, USA},
    keywords  = {aes-ni, data encryption, hash-based digital signatures,
	             sha-ni, vector instructions},
}

Pre-requirements

This library is a standalone C-language code. However, it is used the Google Test C++ library to perform unit tests. You can install gtest library in your system as follows:

 # dnf install gtest-devel

Also, a C++ compiler is needed to compile the test program.


Compilation

After cloning this project into your computer youcan perform either method to obtain the libraries and binaries.

 $ git clone https://github.com/armfazh/flo-shani-aesni 

Method 1:

This method uses CMake tool for compilation.

  • Create a empty folder
 $ cd flo-shani-aesni
 $ mkdir build
 $ cd build
  • Then, configure the compilation:
 $ CC=gcc CXX=g++ cmake ..
  • You are free to choose your favorite compiler. After that, you must compile using:
 $ make 
  • If everthing goes well, your will have a folder called bin with the following files:
 $ ls bin
    bench_aegis
    bench_aes
    bench_sha256 

Method 2:

This method uses classic Make tool for compilation:

 $ cd flo-shani-aesni
 $ make
  • If everthing goes well, your will have a folder called bin with the following files:
 $ ls bin
    bench_aegis
    bench_aes
    bench_sha256 

Running benchmark programs

  • To run the benchmark of the SHA256 hashing function, execute:
 $ bin/bench_sha256

Then, program will show you a table comparing the running time of the hash functions, for example:

 $ bin/bench_sha256
== Start of Benchmark ===

Experiment: comparing OpenSSL vs SHANI
Running OpenSSL (shani):
Running OpenSSL (64-bit):
Running shani:
    Cycles per byte 
╔═════════╦═════════╦═════════╦═════════╦═════════╗
║  Size   ║ OpenSSL ║ OpenSSL ║This work║ Speedup ║
║ (bytes) ║  (x64)  ║ (shani) ║ (shani) ║x64/shani║
╠═════════╩═════════╩═════════╩═════════╩═════════╣
║        1║   717.00║   230.00║   198.00║     3.62║
║        2║   359.00║   115.00║   102.50║     3.50║
║        4║   179.25║    57.25║    52.00║     3.45║
║        8║    89.75║    28.62║    26.00║     3.45║
║       16║    44.56║    13.62║    13.19║     3.38║
║       32║    22.09║     7.03║     7.25║     3.05║
║       64║    19.80║     5.59║     4.58║     4.32║
║      128║    14.05║     3.80║     3.30║     4.25║
║      256║    11.13║     2.91║     2.66║     4.18║
║      512║     9.76║     2.46║     2.34║     4.17║
║     1024║     9.11║     2.24║     2.18║     4.18║
║     2048║     8.73║     2.13║     2.10║     4.16║
║     4096║     8.54║     2.08║     2.06║     4.15║
╚═════════╩═════════╩═════════╩═════════╩═════════╝
== End of Benchmark ===
  • To run the benchmark of the AES encryption, execute:
 $ bin/bench_aes

Then, the program will show you a table reporting the timings of the AES modes of operation:

 $ bin/bench_aes
 == Start of Benchmark ===
 Multiple-message CBC-Encryption:
 Running: CBC Enc 
 Running: CBC Enc 2w
 Running: CBC Enc 4w
 Running: CBC Enc 6w
 Running: CBC Enc 8w
             Cycles per byte 
 ╔═════════╦═════════╦═════════╦═════════╦═════════╦═════════╗
 ║  bytes  ║   1x    ║   2x    ║   4x    ║   6x    ║   8x    ║
 ╠═════════╩═════════╩═════════╩═════════╩═════════╩═════════╣
 ║        1║    21.00║    13.50║     8.25║     7.17║     6.38║
 ║        2║    10.50║     6.75║     4.12║     3.67║     3.00║
 ║        4║     5.25║     3.38║     2.12║     1.79║     1.47║
 ║        8║     2.62║     1.69║     1.03║     0.92║     0.77║
 ║       16║     1.31║     0.84║     0.53║     0.45║     0.38║
 ║       32║     1.44║     0.88║     0.53║     0.44║     0.39║
 ║       64║     1.58║     0.94║     0.59║     0.46║     0.38║
 ║      128║     1.82║     1.15║     0.64║     0.47║     0.38║
 ║      256║     2.24║     1.24║     0.67║     0.47║     0.38║
 ║      512║     2.45║     1.29║     0.67║     0.47║     0.37║
 ║     1024║     2.55║     1.31║     0.67║     0.47║     0.37║
 ║     2048║     2.60║     1.32║     0.68║     0.47║     0.37║
 ║     4096║     2.63║     1.33║     0.68║     0.47║     0.37║
 ╚═════════╩═════════╩═════════╩═════════╩═════════╩═════════╝
== End of Benchmark ===
  • To run the benchmark of AEGIS cipher, execute:
 $ bin/bench_aegis

Then, the program will print a table showing the timings:

 $ bin/bench_aegis
 === Start Benchmarking ===
 Running: Reference Implementation 
 Running: Optimized Implementation 
             Cycles per byte 
 ╔═════════╦═════════╦═════════╦═════════╦═════════╗
 ║  bytes  ║Reference║Optimized║ Speedup ║ Savings ║
 ╠═════════╩═════════╩═════════╩═════════╩═════════╣
 ║        1║   119.00║   132.00║     0.90║  -10.92%║
 ║        2║    59.50║    66.00║     0.90║  -10.92%║
 ║        4║    29.00║    31.50║     0.92║   -8.62%║
 ║        8║    14.50║    15.75║     0.92║   -8.62%║
 ║       16║     5.56║     5.44║     1.02║    2.25%║
 ║       32║     2.97║     2.91║     1.02║    2.11%║
 ║       64║     1.67║     1.62║     1.03║    2.80%║
 ║      128║     1.02║     0.98║     1.05║    4.58%║
 ║      256║     0.72║     0.66║     1.10║    8.70%║
 ║      512║     0.55║     0.49║     1.12║   10.68%║
 ║     1024║     0.49║     0.41║     1.17║   14.69%║
 ║     2048║     0.44║     0.37║     1.19║   16.06%║
 ║     4096║     0.41║     0.35║     1.18║   15.58%║
 ╚═════════╩═════════╩═════════╩═════════╩═════════╝
 === End Benchmarking ===

License

MIT License (LICENSE)


Contact

To report some issues or comments of this project, please use the issues webpage [here].


About

Performance Evaluation of SHA-256 using SHA New Instructions.

Resources

License

Stars

Watchers

Forks

Releases

No releases published

Packages

No packages published

Languages

  • C 81.0%
  • C++ 10.9%
  • CMake 6.0%
  • Makefile 2.1%