Performance metrices of DES, AES etcFinding flaw in cryptographic protocolHow to calculate cycles per byteRSA...

MAC Address learning process

Can a hotel cancel a confirmed reservation?

Is it possible to grant users sftp access without shell access? If yes, how is it implemented?

Why did other German political parties disband so fast when Hitler was appointed chancellor?

Is a new Boolean field better than a null reference when a value can be meaningfully absent?

Can I string the D&D Starter Set campaign into another module, keeping the same characters?

LuaTex and em dashes

How much mayhem could I cause as a sentient fish?

Why is working on the same position for more than 15 years not a red flag?

Why are the books in the Game of Thrones citadel library shelved spine inwards?

A starship is travelling at 0.9c and collides with a small rock. Will it leave a clean hole through, or will more happen?

Why would space fleets be aligned?

What is the wife of a henpecked husband called?

Traveling through the asteriod belt?

Why exactly do action photographers need high fps burst cameras?

What is causing the chain skip after chain replacement?

Making him into a bully (how to show mild violence)

Why is Agricola named as such?

How to prevent cleaner from hanging my lock screen in Ubuntu 16.04

Why did Luke use his left hand to shoot?

Can I write a book of my D&D game?

Why was Lupin comfortable with saying Voldemort's name?

How does Leonard in "Memento" remember reading and writing?

Consequences of lack of rigour



Performance metrices of DES, AES etc


Finding flaw in cryptographic protocolHow to calculate cycles per byteRSA performanceHow can k3d3/ed25519-java's performance be improved?How to compare different signature scheme's performance?Performance of ECDSA, ECKCDSA and ECGDSAABE Schemes - Access Structures & PerformanceHow to measure performance for ABE SchemesElliptic Curve SSL performance: ECDHE and/or ECDSA?Fast Symmetric Encryption Algorithms: My OptionsWhat are sources for the performance difference in asymmetric and symmetric encryption?













2












$begingroup$


I'm a beginner and working on cryptography performance metrics.




  • My question is that what are the important metrics to check the performance of Cryptography Algorithms.










share|improve this question









New contributor




Anum is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.







$endgroup$








  • 1




    $begingroup$
    Money, money, money...
    $endgroup$
    – kelalaka
    4 hours ago










  • $begingroup$
    @kelalaka It appears not. I tried appealing to the pocket with Finding flaw in cryptographic protocol and got spanked.
    $endgroup$
    – Paul Uszak
    3 hours ago










  • $begingroup$
    @PaulUszak That was for an action that would be considered negative / going to the dark side by most of the cryptographic community. Money is nice to have, but fortunately a lot of people (apparently including many cryptographers) put morale still above money. Of course if you find selling vulnerabilities to the authority of your choice morale right or wrong depends on your point of view (which is why I didn't up- or downvote it).
    $endgroup$
    – Maarten Bodewes
    3 hours ago


















2












$begingroup$


I'm a beginner and working on cryptography performance metrics.




  • My question is that what are the important metrics to check the performance of Cryptography Algorithms.










share|improve this question









New contributor




Anum is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.







$endgroup$








  • 1




    $begingroup$
    Money, money, money...
    $endgroup$
    – kelalaka
    4 hours ago










  • $begingroup$
    @kelalaka It appears not. I tried appealing to the pocket with Finding flaw in cryptographic protocol and got spanked.
    $endgroup$
    – Paul Uszak
    3 hours ago










  • $begingroup$
    @PaulUszak That was for an action that would be considered negative / going to the dark side by most of the cryptographic community. Money is nice to have, but fortunately a lot of people (apparently including many cryptographers) put morale still above money. Of course if you find selling vulnerabilities to the authority of your choice morale right or wrong depends on your point of view (which is why I didn't up- or downvote it).
    $endgroup$
    – Maarten Bodewes
    3 hours ago
















2












2








2


1



$begingroup$


I'm a beginner and working on cryptography performance metrics.




  • My question is that what are the important metrics to check the performance of Cryptography Algorithms.










share|improve this question









New contributor




Anum is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.







$endgroup$




I'm a beginner and working on cryptography performance metrics.




  • My question is that what are the important metrics to check the performance of Cryptography Algorithms.







performance






share|improve this question









New contributor




Anum is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.











share|improve this question









New contributor




Anum is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









share|improve this question




share|improve this question








edited 3 hours ago









AleksanderRas

2,5621834




2,5621834






New contributor




Anum is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.









asked 4 hours ago









AnumAnum

111




111




New contributor




Anum is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.





New contributor





Anum is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.






Anum is a new contributor to this site. Take care in asking for clarification, commenting, and answering.
Check out our Code of Conduct.








  • 1




    $begingroup$
    Money, money, money...
    $endgroup$
    – kelalaka
    4 hours ago










  • $begingroup$
    @kelalaka It appears not. I tried appealing to the pocket with Finding flaw in cryptographic protocol and got spanked.
    $endgroup$
    – Paul Uszak
    3 hours ago










  • $begingroup$
    @PaulUszak That was for an action that would be considered negative / going to the dark side by most of the cryptographic community. Money is nice to have, but fortunately a lot of people (apparently including many cryptographers) put morale still above money. Of course if you find selling vulnerabilities to the authority of your choice morale right or wrong depends on your point of view (which is why I didn't up- or downvote it).
    $endgroup$
    – Maarten Bodewes
    3 hours ago
















  • 1




    $begingroup$
    Money, money, money...
    $endgroup$
    – kelalaka
    4 hours ago










  • $begingroup$
    @kelalaka It appears not. I tried appealing to the pocket with Finding flaw in cryptographic protocol and got spanked.
    $endgroup$
    – Paul Uszak
    3 hours ago










  • $begingroup$
    @PaulUszak That was for an action that would be considered negative / going to the dark side by most of the cryptographic community. Money is nice to have, but fortunately a lot of people (apparently including many cryptographers) put morale still above money. Of course if you find selling vulnerabilities to the authority of your choice morale right or wrong depends on your point of view (which is why I didn't up- or downvote it).
    $endgroup$
    – Maarten Bodewes
    3 hours ago










1




1




$begingroup$
Money, money, money...
$endgroup$
– kelalaka
4 hours ago




$begingroup$
Money, money, money...
$endgroup$
– kelalaka
4 hours ago












$begingroup$
@kelalaka It appears not. I tried appealing to the pocket with Finding flaw in cryptographic protocol and got spanked.
$endgroup$
– Paul Uszak
3 hours ago




$begingroup$
@kelalaka It appears not. I tried appealing to the pocket with Finding flaw in cryptographic protocol and got spanked.
$endgroup$
– Paul Uszak
3 hours ago












$begingroup$
@PaulUszak That was for an action that would be considered negative / going to the dark side by most of the cryptographic community. Money is nice to have, but fortunately a lot of people (apparently including many cryptographers) put morale still above money. Of course if you find selling vulnerabilities to the authority of your choice morale right or wrong depends on your point of view (which is why I didn't up- or downvote it).
$endgroup$
– Maarten Bodewes
3 hours ago






$begingroup$
@PaulUszak That was for an action that would be considered negative / going to the dark side by most of the cryptographic community. Money is nice to have, but fortunately a lot of people (apparently including many cryptographers) put morale still above money. Of course if you find selling vulnerabilities to the authority of your choice morale right or wrong depends on your point of view (which is why I didn't up- or downvote it).
$endgroup$
– Maarten Bodewes
3 hours ago












2 Answers
2






active

oldest

votes


















2












$begingroup$

Criteria for evaluation of Cryptography Algorithms:




  • Having public specification (the only secret is the key).

  • Patent status.

  • What it aims at: block cipher (DES, AES..), cipher, message digest, MAC, proof of origin, signature, key establishment, TRNG, PRNG.

  • Requirements for and limitations of the algorithm itself.


    • Randomness requirements;

    • Requirements to validate the input parameters (e.g. public key for ECDH).



  • Being symmetric (block ciphers, SHA) or asymmetric (RSA, ECDSA, ECDH).

  • Security under some threat model:


    • Resistance to key recovery (bounded at least by key size);

    • Block size (for block ciphers);

    • Resistance to pure cryptanalytic attacks;

    • Resistance to side-channel leakage (with many subdivisions);

    • Resistance to fault injection.



  • Complexity and familiarity / learning curve to use the algorithm.

  • Parameter sizes:


    • Output size (overhead / expansion ratio);

    • Encoded (public) key size;

    • Accepted input sizes;



  • Speed (often very platform-dependent):


    • Cycles/byte averages for large messages or multiple uses with the same key;

    • Time to setup a new key;

    • Time versus size.



  • Memory footprint:


    • Code;

    • RAM per running instance.



  • Availability of a version with suitable characteristics as above on a given platform.

  • Acceptance by security authorities.


Note: fell free to restructure / add to the list, this is a community wiki.






share|improve this answer











$endgroup$













  • $begingroup$
    @Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
    $endgroup$
    – fgrieu
    3 hours ago












  • $begingroup$
    Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
    $endgroup$
    – Maarten Bodewes
    2 hours ago










  • $begingroup$
    There's a lot of useful information here, but I notice that the question asked about what are the important metrics to check the performance of Cryptography Algorithms, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?
    $endgroup$
    – Ella Rose
    58 mins ago



















1












$begingroup$

The SUPERCOP page lists the following criteria:



Hashing





  • Time to hash a very short packet of data.


  • Time to hash a typical-size Internet packet.


  • Time to hash a long message.


  • Length of the hash output.





Symmetric encryption





  • Time to encrypt a very short packet of data using a secret key and a nonce.


  • Time to encrypt a typical-size Internet packet.


  • Time to encrypt a long message.


  • Length of the secret key.


  • Length of the nonce.


  • Time for authenticated encryption of a short packet of data.


  • Time for authenticated encryption of a typical-size Internet packet.


  • Time for authenticated encryption of a long message.





Asymmetric algorithms





  • Time to generate a key pair (a private key and a corresponding public key).


  • Length of the private key.


  • Length of the public key.


  • Time to generate a shared secret from a private key and another user's public key.


  • Length of the shared secret.


  • Time to encrypt a message using a public key.


  • Length of the encrypted message.


  • Time to decrypt a message using a private key.


  • Time to sign a message using a private key.


  • Length of the signed message.


  • Time to verify a signed message using a public key.





MACs



Curiously, MACs do not appear to be measured with SUPERCOP. AEAD schemes may include them, but there is not standalone category for measuring MACs. Some relevant metrics might be:




  • Key size

  • Time to evaluate on small messages

  • Time to evaluate on large messages


Other metrics



Another standard metric (as mentioned in another answer) is cycles per byte. This is a measurement of how many CPU cycles it took to perform the operation per each byte of input.



I suspect that power consumption may also be a relevant metric, considering the prevalence of mobile/IoT devices.



Throughput is a common metric, which is the amount of data per unit of time (e.g. second) that a system can process.



As mentioned in the other answer (again), many of these metrics will be platform dependent.



Note



The above includes metrics used for asymmetric algorithms and hashing, but the question mentions interest in DES, AES, etc and so may only be interested in symmetric encryption algorithms or all of the above - it is not clear.






share|improve this answer











$endgroup$













    Your Answer





    StackExchange.ifUsing("editor", function () {
    return StackExchange.using("mathjaxEditing", function () {
    StackExchange.MarkdownEditor.creationCallbacks.add(function (editor, postfix) {
    StackExchange.mathjaxEditing.prepareWmdForMathJax(editor, postfix, [["$", "$"], ["\\(","\\)"]]);
    });
    });
    }, "mathjax-editing");

    StackExchange.ready(function() {
    var channelOptions = {
    tags: "".split(" "),
    id: "281"
    };
    initTagRenderer("".split(" "), "".split(" "), channelOptions);

    StackExchange.using("externalEditor", function() {
    // Have to fire editor after snippets, if snippets enabled
    if (StackExchange.settings.snippets.snippetsEnabled) {
    StackExchange.using("snippets", function() {
    createEditor();
    });
    }
    else {
    createEditor();
    }
    });

    function createEditor() {
    StackExchange.prepareEditor({
    heartbeatType: 'answer',
    autoActivateHeartbeat: false,
    convertImagesToLinks: false,
    noModals: true,
    showLowRepImageUploadWarning: true,
    reputationToPostImages: null,
    bindNavPrevention: true,
    postfix: "",
    imageUploader: {
    brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
    contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
    allowUrls: true
    },
    noCode: true, onDemand: true,
    discardSelector: ".discard-answer"
    ,immediatelyShowMarkdownHelp:true
    });


    }
    });






    Anum is a new contributor. Be nice, and check out our Code of Conduct.










    draft saved

    draft discarded


















    StackExchange.ready(
    function () {
    StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f67667%2fperformance-metrices-of-des-aes-etc%23new-answer', 'question_page');
    }
    );

    Post as a guest















    Required, but never shown

























    2 Answers
    2






    active

    oldest

    votes








    2 Answers
    2






    active

    oldest

    votes









    active

    oldest

    votes






    active

    oldest

    votes









    2












    $begingroup$

    Criteria for evaluation of Cryptography Algorithms:




    • Having public specification (the only secret is the key).

    • Patent status.

    • What it aims at: block cipher (DES, AES..), cipher, message digest, MAC, proof of origin, signature, key establishment, TRNG, PRNG.

    • Requirements for and limitations of the algorithm itself.


      • Randomness requirements;

      • Requirements to validate the input parameters (e.g. public key for ECDH).



    • Being symmetric (block ciphers, SHA) or asymmetric (RSA, ECDSA, ECDH).

    • Security under some threat model:


      • Resistance to key recovery (bounded at least by key size);

      • Block size (for block ciphers);

      • Resistance to pure cryptanalytic attacks;

      • Resistance to side-channel leakage (with many subdivisions);

      • Resistance to fault injection.



    • Complexity and familiarity / learning curve to use the algorithm.

    • Parameter sizes:


      • Output size (overhead / expansion ratio);

      • Encoded (public) key size;

      • Accepted input sizes;



    • Speed (often very platform-dependent):


      • Cycles/byte averages for large messages or multiple uses with the same key;

      • Time to setup a new key;

      • Time versus size.



    • Memory footprint:


      • Code;

      • RAM per running instance.



    • Availability of a version with suitable characteristics as above on a given platform.

    • Acceptance by security authorities.


    Note: fell free to restructure / add to the list, this is a community wiki.






    share|improve this answer











    $endgroup$













    • $begingroup$
      @Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
      $endgroup$
      – fgrieu
      3 hours ago












    • $begingroup$
      Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
      $endgroup$
      – Maarten Bodewes
      2 hours ago










    • $begingroup$
      There's a lot of useful information here, but I notice that the question asked about what are the important metrics to check the performance of Cryptography Algorithms, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?
      $endgroup$
      – Ella Rose
      58 mins ago
















    2












    $begingroup$

    Criteria for evaluation of Cryptography Algorithms:




    • Having public specification (the only secret is the key).

    • Patent status.

    • What it aims at: block cipher (DES, AES..), cipher, message digest, MAC, proof of origin, signature, key establishment, TRNG, PRNG.

    • Requirements for and limitations of the algorithm itself.


      • Randomness requirements;

      • Requirements to validate the input parameters (e.g. public key for ECDH).



    • Being symmetric (block ciphers, SHA) or asymmetric (RSA, ECDSA, ECDH).

    • Security under some threat model:


      • Resistance to key recovery (bounded at least by key size);

      • Block size (for block ciphers);

      • Resistance to pure cryptanalytic attacks;

      • Resistance to side-channel leakage (with many subdivisions);

      • Resistance to fault injection.



    • Complexity and familiarity / learning curve to use the algorithm.

    • Parameter sizes:


      • Output size (overhead / expansion ratio);

      • Encoded (public) key size;

      • Accepted input sizes;



    • Speed (often very platform-dependent):


      • Cycles/byte averages for large messages or multiple uses with the same key;

      • Time to setup a new key;

      • Time versus size.



    • Memory footprint:


      • Code;

      • RAM per running instance.



    • Availability of a version with suitable characteristics as above on a given platform.

    • Acceptance by security authorities.


    Note: fell free to restructure / add to the list, this is a community wiki.






    share|improve this answer











    $endgroup$













    • $begingroup$
      @Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
      $endgroup$
      – fgrieu
      3 hours ago












    • $begingroup$
      Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
      $endgroup$
      – Maarten Bodewes
      2 hours ago










    • $begingroup$
      There's a lot of useful information here, but I notice that the question asked about what are the important metrics to check the performance of Cryptography Algorithms, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?
      $endgroup$
      – Ella Rose
      58 mins ago














    2












    2








    2





    $begingroup$

    Criteria for evaluation of Cryptography Algorithms:




    • Having public specification (the only secret is the key).

    • Patent status.

    • What it aims at: block cipher (DES, AES..), cipher, message digest, MAC, proof of origin, signature, key establishment, TRNG, PRNG.

    • Requirements for and limitations of the algorithm itself.


      • Randomness requirements;

      • Requirements to validate the input parameters (e.g. public key for ECDH).



    • Being symmetric (block ciphers, SHA) or asymmetric (RSA, ECDSA, ECDH).

    • Security under some threat model:


      • Resistance to key recovery (bounded at least by key size);

      • Block size (for block ciphers);

      • Resistance to pure cryptanalytic attacks;

      • Resistance to side-channel leakage (with many subdivisions);

      • Resistance to fault injection.



    • Complexity and familiarity / learning curve to use the algorithm.

    • Parameter sizes:


      • Output size (overhead / expansion ratio);

      • Encoded (public) key size;

      • Accepted input sizes;



    • Speed (often very platform-dependent):


      • Cycles/byte averages for large messages or multiple uses with the same key;

      • Time to setup a new key;

      • Time versus size.



    • Memory footprint:


      • Code;

      • RAM per running instance.



    • Availability of a version with suitable characteristics as above on a given platform.

    • Acceptance by security authorities.


    Note: fell free to restructure / add to the list, this is a community wiki.






    share|improve this answer











    $endgroup$



    Criteria for evaluation of Cryptography Algorithms:




    • Having public specification (the only secret is the key).

    • Patent status.

    • What it aims at: block cipher (DES, AES..), cipher, message digest, MAC, proof of origin, signature, key establishment, TRNG, PRNG.

    • Requirements for and limitations of the algorithm itself.


      • Randomness requirements;

      • Requirements to validate the input parameters (e.g. public key for ECDH).



    • Being symmetric (block ciphers, SHA) or asymmetric (RSA, ECDSA, ECDH).

    • Security under some threat model:


      • Resistance to key recovery (bounded at least by key size);

      • Block size (for block ciphers);

      • Resistance to pure cryptanalytic attacks;

      • Resistance to side-channel leakage (with many subdivisions);

      • Resistance to fault injection.



    • Complexity and familiarity / learning curve to use the algorithm.

    • Parameter sizes:


      • Output size (overhead / expansion ratio);

      • Encoded (public) key size;

      • Accepted input sizes;



    • Speed (often very platform-dependent):


      • Cycles/byte averages for large messages or multiple uses with the same key;

      • Time to setup a new key;

      • Time versus size.



    • Memory footprint:


      • Code;

      • RAM per running instance.



    • Availability of a version with suitable characteristics as above on a given platform.

    • Acceptance by security authorities.


    Note: fell free to restructure / add to the list, this is a community wiki.







    share|improve this answer














    share|improve this answer



    share|improve this answer








    edited 2 hours ago


























    community wiki





    6 revs, 3 users 64%
    fgrieu













    • $begingroup$
      @Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
      $endgroup$
      – fgrieu
      3 hours ago












    • $begingroup$
      Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
      $endgroup$
      – Maarten Bodewes
      2 hours ago










    • $begingroup$
      There's a lot of useful information here, but I notice that the question asked about what are the important metrics to check the performance of Cryptography Algorithms, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?
      $endgroup$
      – Ella Rose
      58 mins ago


















    • $begingroup$
      @Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
      $endgroup$
      – fgrieu
      3 hours ago












    • $begingroup$
      Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
      $endgroup$
      – Maarten Bodewes
      2 hours ago










    • $begingroup$
      There's a lot of useful information here, but I notice that the question asked about what are the important metrics to check the performance of Cryptography Algorithms, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?
      $endgroup$
      – Ella Rose
      58 mins ago
















    $begingroup$
    @Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
    $endgroup$
    – fgrieu
    3 hours ago






    $begingroup$
    @Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
    $endgroup$
    – fgrieu
    3 hours ago














    $begingroup$
    Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
    $endgroup$
    – Maarten Bodewes
    2 hours ago




    $begingroup$
    Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
    $endgroup$
    – Maarten Bodewes
    2 hours ago












    $begingroup$
    There's a lot of useful information here, but I notice that the question asked about what are the important metrics to check the performance of Cryptography Algorithms, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?
    $endgroup$
    – Ella Rose
    58 mins ago




    $begingroup$
    There's a lot of useful information here, but I notice that the question asked about what are the important metrics to check the performance of Cryptography Algorithms, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?
    $endgroup$
    – Ella Rose
    58 mins ago











    1












    $begingroup$

    The SUPERCOP page lists the following criteria:



    Hashing





    • Time to hash a very short packet of data.


    • Time to hash a typical-size Internet packet.


    • Time to hash a long message.


    • Length of the hash output.





    Symmetric encryption





    • Time to encrypt a very short packet of data using a secret key and a nonce.


    • Time to encrypt a typical-size Internet packet.


    • Time to encrypt a long message.


    • Length of the secret key.


    • Length of the nonce.


    • Time for authenticated encryption of a short packet of data.


    • Time for authenticated encryption of a typical-size Internet packet.


    • Time for authenticated encryption of a long message.





    Asymmetric algorithms





    • Time to generate a key pair (a private key and a corresponding public key).


    • Length of the private key.


    • Length of the public key.


    • Time to generate a shared secret from a private key and another user's public key.


    • Length of the shared secret.


    • Time to encrypt a message using a public key.


    • Length of the encrypted message.


    • Time to decrypt a message using a private key.


    • Time to sign a message using a private key.


    • Length of the signed message.


    • Time to verify a signed message using a public key.





    MACs



    Curiously, MACs do not appear to be measured with SUPERCOP. AEAD schemes may include them, but there is not standalone category for measuring MACs. Some relevant metrics might be:




    • Key size

    • Time to evaluate on small messages

    • Time to evaluate on large messages


    Other metrics



    Another standard metric (as mentioned in another answer) is cycles per byte. This is a measurement of how many CPU cycles it took to perform the operation per each byte of input.



    I suspect that power consumption may also be a relevant metric, considering the prevalence of mobile/IoT devices.



    Throughput is a common metric, which is the amount of data per unit of time (e.g. second) that a system can process.



    As mentioned in the other answer (again), many of these metrics will be platform dependent.



    Note



    The above includes metrics used for asymmetric algorithms and hashing, but the question mentions interest in DES, AES, etc and so may only be interested in symmetric encryption algorithms or all of the above - it is not clear.






    share|improve this answer











    $endgroup$


















      1












      $begingroup$

      The SUPERCOP page lists the following criteria:



      Hashing





      • Time to hash a very short packet of data.


      • Time to hash a typical-size Internet packet.


      • Time to hash a long message.


      • Length of the hash output.





      Symmetric encryption





      • Time to encrypt a very short packet of data using a secret key and a nonce.


      • Time to encrypt a typical-size Internet packet.


      • Time to encrypt a long message.


      • Length of the secret key.


      • Length of the nonce.


      • Time for authenticated encryption of a short packet of data.


      • Time for authenticated encryption of a typical-size Internet packet.


      • Time for authenticated encryption of a long message.





      Asymmetric algorithms





      • Time to generate a key pair (a private key and a corresponding public key).


      • Length of the private key.


      • Length of the public key.


      • Time to generate a shared secret from a private key and another user's public key.


      • Length of the shared secret.


      • Time to encrypt a message using a public key.


      • Length of the encrypted message.


      • Time to decrypt a message using a private key.


      • Time to sign a message using a private key.


      • Length of the signed message.


      • Time to verify a signed message using a public key.





      MACs



      Curiously, MACs do not appear to be measured with SUPERCOP. AEAD schemes may include them, but there is not standalone category for measuring MACs. Some relevant metrics might be:




      • Key size

      • Time to evaluate on small messages

      • Time to evaluate on large messages


      Other metrics



      Another standard metric (as mentioned in another answer) is cycles per byte. This is a measurement of how many CPU cycles it took to perform the operation per each byte of input.



      I suspect that power consumption may also be a relevant metric, considering the prevalence of mobile/IoT devices.



      Throughput is a common metric, which is the amount of data per unit of time (e.g. second) that a system can process.



      As mentioned in the other answer (again), many of these metrics will be platform dependent.



      Note



      The above includes metrics used for asymmetric algorithms and hashing, but the question mentions interest in DES, AES, etc and so may only be interested in symmetric encryption algorithms or all of the above - it is not clear.






      share|improve this answer











      $endgroup$
















        1












        1








        1





        $begingroup$

        The SUPERCOP page lists the following criteria:



        Hashing





        • Time to hash a very short packet of data.


        • Time to hash a typical-size Internet packet.


        • Time to hash a long message.


        • Length of the hash output.





        Symmetric encryption





        • Time to encrypt a very short packet of data using a secret key and a nonce.


        • Time to encrypt a typical-size Internet packet.


        • Time to encrypt a long message.


        • Length of the secret key.


        • Length of the nonce.


        • Time for authenticated encryption of a short packet of data.


        • Time for authenticated encryption of a typical-size Internet packet.


        • Time for authenticated encryption of a long message.





        Asymmetric algorithms





        • Time to generate a key pair (a private key and a corresponding public key).


        • Length of the private key.


        • Length of the public key.


        • Time to generate a shared secret from a private key and another user's public key.


        • Length of the shared secret.


        • Time to encrypt a message using a public key.


        • Length of the encrypted message.


        • Time to decrypt a message using a private key.


        • Time to sign a message using a private key.


        • Length of the signed message.


        • Time to verify a signed message using a public key.





        MACs



        Curiously, MACs do not appear to be measured with SUPERCOP. AEAD schemes may include them, but there is not standalone category for measuring MACs. Some relevant metrics might be:




        • Key size

        • Time to evaluate on small messages

        • Time to evaluate on large messages


        Other metrics



        Another standard metric (as mentioned in another answer) is cycles per byte. This is a measurement of how many CPU cycles it took to perform the operation per each byte of input.



        I suspect that power consumption may also be a relevant metric, considering the prevalence of mobile/IoT devices.



        Throughput is a common metric, which is the amount of data per unit of time (e.g. second) that a system can process.



        As mentioned in the other answer (again), many of these metrics will be platform dependent.



        Note



        The above includes metrics used for asymmetric algorithms and hashing, but the question mentions interest in DES, AES, etc and so may only be interested in symmetric encryption algorithms or all of the above - it is not clear.






        share|improve this answer











        $endgroup$



        The SUPERCOP page lists the following criteria:



        Hashing





        • Time to hash a very short packet of data.


        • Time to hash a typical-size Internet packet.


        • Time to hash a long message.


        • Length of the hash output.





        Symmetric encryption





        • Time to encrypt a very short packet of data using a secret key and a nonce.


        • Time to encrypt a typical-size Internet packet.


        • Time to encrypt a long message.


        • Length of the secret key.


        • Length of the nonce.


        • Time for authenticated encryption of a short packet of data.


        • Time for authenticated encryption of a typical-size Internet packet.


        • Time for authenticated encryption of a long message.





        Asymmetric algorithms





        • Time to generate a key pair (a private key and a corresponding public key).


        • Length of the private key.


        • Length of the public key.


        • Time to generate a shared secret from a private key and another user's public key.


        • Length of the shared secret.


        • Time to encrypt a message using a public key.


        • Length of the encrypted message.


        • Time to decrypt a message using a private key.


        • Time to sign a message using a private key.


        • Length of the signed message.


        • Time to verify a signed message using a public key.





        MACs



        Curiously, MACs do not appear to be measured with SUPERCOP. AEAD schemes may include them, but there is not standalone category for measuring MACs. Some relevant metrics might be:




        • Key size

        • Time to evaluate on small messages

        • Time to evaluate on large messages


        Other metrics



        Another standard metric (as mentioned in another answer) is cycles per byte. This is a measurement of how many CPU cycles it took to perform the operation per each byte of input.



        I suspect that power consumption may also be a relevant metric, considering the prevalence of mobile/IoT devices.



        Throughput is a common metric, which is the amount of data per unit of time (e.g. second) that a system can process.



        As mentioned in the other answer (again), many of these metrics will be platform dependent.



        Note



        The above includes metrics used for asymmetric algorithms and hashing, but the question mentions interest in DES, AES, etc and so may only be interested in symmetric encryption algorithms or all of the above - it is not clear.







        share|improve this answer














        share|improve this answer



        share|improve this answer








        edited 26 secs ago

























        answered 25 mins ago









        Ella RoseElla Rose

        16.3k44281




        16.3k44281






















            Anum is a new contributor. Be nice, and check out our Code of Conduct.










            draft saved

            draft discarded


















            Anum is a new contributor. Be nice, and check out our Code of Conduct.













            Anum is a new contributor. Be nice, and check out our Code of Conduct.












            Anum is a new contributor. Be nice, and check out our Code of Conduct.
















            Thanks for contributing an answer to Cryptography Stack Exchange!


            • Please be sure to answer the question. Provide details and share your research!

            But avoid



            • Asking for help, clarification, or responding to other answers.

            • Making statements based on opinion; back them up with references or personal experience.


            Use MathJax to format equations. MathJax reference.


            To learn more, see our tips on writing great answers.




            draft saved


            draft discarded














            StackExchange.ready(
            function () {
            StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f67667%2fperformance-metrices-of-des-aes-etc%23new-answer', 'question_page');
            }
            );

            Post as a guest















            Required, but never shown





















































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown

































            Required, but never shown














            Required, but never shown












            Required, but never shown







            Required, but never shown







            Popular posts from this blog

            Benedict Cumberbatch Contingut Inicis Debut professional Premis Filmografia bàsica Premis i...

            Monticle de plataforma Contingut Est de Nord Amèrica Interpretacions Altres cultures Vegeu...

            Escacs Janus Enllaços externs Menú de navegacióEscacs JanusJanusschachBrainKing.comChessV