Performance metrices of DES, AES etcFinding flaw in cryptographic protocolHow to calculate cycles per byteRSA...
MAC Address learning process
Can a hotel cancel a confirmed reservation?
Is it possible to grant users sftp access without shell access? If yes, how is it implemented?
Why did other German political parties disband so fast when Hitler was appointed chancellor?
Is a new Boolean field better than a null reference when a value can be meaningfully absent?
Can I string the D&D Starter Set campaign into another module, keeping the same characters?
LuaTex and em dashes
How much mayhem could I cause as a sentient fish?
Why is working on the same position for more than 15 years not a red flag?
Why are the books in the Game of Thrones citadel library shelved spine inwards?
A starship is travelling at 0.9c and collides with a small rock. Will it leave a clean hole through, or will more happen?
Why would space fleets be aligned?
What is the wife of a henpecked husband called?
Traveling through the asteriod belt?
Why exactly do action photographers need high fps burst cameras?
What is causing the chain skip after chain replacement?
Making him into a bully (how to show mild violence)
Why is Agricola named as such?
How to prevent cleaner from hanging my lock screen in Ubuntu 16.04
Why did Luke use his left hand to shoot?
Can I write a book of my D&D game?
Why was Lupin comfortable with saying Voldemort's name?
How does Leonard in "Memento" remember reading and writing?
Consequences of lack of rigour
Performance metrices of DES, AES etc
Finding flaw in cryptographic protocolHow to calculate cycles per byteRSA performanceHow can k3d3/ed25519-java's performance be improved?How to compare different signature scheme's performance?Performance of ECDSA, ECKCDSA and ECGDSAABE Schemes - Access Structures & PerformanceHow to measure performance for ABE SchemesElliptic Curve SSL performance: ECDHE and/or ECDSA?Fast Symmetric Encryption Algorithms: My OptionsWhat are sources for the performance difference in asymmetric and symmetric encryption?
$begingroup$
I'm a beginner and working on cryptography performance metrics.
- My question is that what are the important metrics to check the performance of Cryptography Algorithms.
performance
New contributor
$endgroup$
add a comment |
$begingroup$
I'm a beginner and working on cryptography performance metrics.
- My question is that what are the important metrics to check the performance of Cryptography Algorithms.
performance
New contributor
$endgroup$
1
$begingroup$
Money, money, money...
$endgroup$
– kelalaka
4 hours ago
$begingroup$
@kelalaka It appears not. I tried appealing to the pocket with Finding flaw in cryptographic protocol and got spanked.
$endgroup$
– Paul Uszak
3 hours ago
$begingroup$
@PaulUszak That was for an action that would be considered negative / going to the dark side by most of the cryptographic community. Money is nice to have, but fortunately a lot of people (apparently including many cryptographers) put morale still above money. Of course if you find selling vulnerabilities to the authority of your choice morale right or wrong depends on your point of view (which is why I didn't up- or downvote it).
$endgroup$
– Maarten Bodewes♦
3 hours ago
add a comment |
$begingroup$
I'm a beginner and working on cryptography performance metrics.
- My question is that what are the important metrics to check the performance of Cryptography Algorithms.
performance
New contributor
$endgroup$
I'm a beginner and working on cryptography performance metrics.
- My question is that what are the important metrics to check the performance of Cryptography Algorithms.
performance
performance
New contributor
New contributor
edited 3 hours ago
AleksanderRas
2,5621834
2,5621834
New contributor
asked 4 hours ago
AnumAnum
111
111
New contributor
New contributor
1
$begingroup$
Money, money, money...
$endgroup$
– kelalaka
4 hours ago
$begingroup$
@kelalaka It appears not. I tried appealing to the pocket with Finding flaw in cryptographic protocol and got spanked.
$endgroup$
– Paul Uszak
3 hours ago
$begingroup$
@PaulUszak That was for an action that would be considered negative / going to the dark side by most of the cryptographic community. Money is nice to have, but fortunately a lot of people (apparently including many cryptographers) put morale still above money. Of course if you find selling vulnerabilities to the authority of your choice morale right or wrong depends on your point of view (which is why I didn't up- or downvote it).
$endgroup$
– Maarten Bodewes♦
3 hours ago
add a comment |
1
$begingroup$
Money, money, money...
$endgroup$
– kelalaka
4 hours ago
$begingroup$
@kelalaka It appears not. I tried appealing to the pocket with Finding flaw in cryptographic protocol and got spanked.
$endgroup$
– Paul Uszak
3 hours ago
$begingroup$
@PaulUszak That was for an action that would be considered negative / going to the dark side by most of the cryptographic community. Money is nice to have, but fortunately a lot of people (apparently including many cryptographers) put morale still above money. Of course if you find selling vulnerabilities to the authority of your choice morale right or wrong depends on your point of view (which is why I didn't up- or downvote it).
$endgroup$
– Maarten Bodewes♦
3 hours ago
1
1
$begingroup$
Money, money, money...
$endgroup$
– kelalaka
4 hours ago
$begingroup$
Money, money, money...
$endgroup$
– kelalaka
4 hours ago
$begingroup$
@kelalaka It appears not. I tried appealing to the pocket with Finding flaw in cryptographic protocol and got spanked.
$endgroup$
– Paul Uszak
3 hours ago
$begingroup$
@kelalaka It appears not. I tried appealing to the pocket with Finding flaw in cryptographic protocol and got spanked.
$endgroup$
– Paul Uszak
3 hours ago
$begingroup$
@PaulUszak That was for an action that would be considered negative / going to the dark side by most of the cryptographic community. Money is nice to have, but fortunately a lot of people (apparently including many cryptographers) put morale still above money. Of course if you find selling vulnerabilities to the authority of your choice morale right or wrong depends on your point of view (which is why I didn't up- or downvote it).
$endgroup$
– Maarten Bodewes♦
3 hours ago
$begingroup$
@PaulUszak That was for an action that would be considered negative / going to the dark side by most of the cryptographic community. Money is nice to have, but fortunately a lot of people (apparently including many cryptographers) put morale still above money. Of course if you find selling vulnerabilities to the authority of your choice morale right or wrong depends on your point of view (which is why I didn't up- or downvote it).
$endgroup$
– Maarten Bodewes♦
3 hours ago
add a comment |
2 Answers
2
active
oldest
votes
$begingroup$
Criteria for evaluation of Cryptography Algorithms:
- Having public specification (the only secret is the key).
- Patent status.
- What it aims at: block cipher (DES, AES..), cipher, message digest, MAC, proof of origin, signature, key establishment, TRNG, PRNG.
- Requirements for and limitations of the algorithm itself.
- Randomness requirements;
- Requirements to validate the input parameters (e.g. public key for ECDH).
- Being symmetric (block ciphers, SHA) or asymmetric (RSA, ECDSA, ECDH).
- Security under some threat model:
- Resistance to key recovery (bounded at least by key size);
- Block size (for block ciphers);
- Resistance to pure cryptanalytic attacks;
- Resistance to side-channel leakage (with many subdivisions);
- Resistance to fault injection.
- Complexity and familiarity / learning curve to use the algorithm.
- Parameter sizes:
- Output size (overhead / expansion ratio);
- Encoded (public) key size;
- Accepted input sizes;
- Speed (often very platform-dependent):
- Cycles/byte averages for large messages or multiple uses with the same key;
- Time to setup a new key;
- Time versus size.
- Memory footprint:
- Code;
- RAM per running instance.
- Availability of a version with suitable characteristics as above on a given platform.
- Acceptance by security authorities.
Note: fell free to restructure / add to the list, this is a community wiki.
$endgroup$
$begingroup$
@Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
$endgroup$
– fgrieu
3 hours ago
$begingroup$
Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
$endgroup$
– Maarten Bodewes♦
2 hours ago
$begingroup$
There's a lot of useful information here, but I notice that the question asked aboutwhat are the important metrics to check the performance of Cryptography Algorithms
, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?
$endgroup$
– Ella Rose♦
58 mins ago
add a comment |
$begingroup$
The SUPERCOP page lists the following criteria:
Hashing
Time to hash a very short packet of data.
Time to hash a typical-size Internet packet.
Time to hash a long message.
Length of the hash output.
Symmetric encryption
Time to encrypt a very short packet of data using a secret key and a nonce.
Time to encrypt a typical-size Internet packet.
Time to encrypt a long message.
Length of the secret key.
Length of the nonce.
Time for authenticated encryption of a short packet of data.
Time for authenticated encryption of a typical-size Internet packet.
Time for authenticated encryption of a long message.
Asymmetric algorithms
Time to generate a key pair (a private key and a corresponding public key).
Length of the private key.
Length of the public key.
Time to generate a shared secret from a private key and another user's public key.
Length of the shared secret.
Time to encrypt a message using a public key.
Length of the encrypted message.
Time to decrypt a message using a private key.
Time to sign a message using a private key.
Length of the signed message.
Time to verify a signed message using a public key.
MACs
Curiously, MACs do not appear to be measured with SUPERCOP. AEAD schemes may include them, but there is not standalone category for measuring MACs. Some relevant metrics might be:
- Key size
- Time to evaluate on small messages
- Time to evaluate on large messages
Other metrics
Another standard metric (as mentioned in another answer) is cycles per byte. This is a measurement of how many CPU cycles it took to perform the operation per each byte of input.
I suspect that power consumption may also be a relevant metric, considering the prevalence of mobile/IoT devices.
Throughput is a common metric, which is the amount of data per unit of time (e.g. second) that a system can process.
As mentioned in the other answer (again), many of these metrics will be platform dependent.
Note
The above includes metrics used for asymmetric algorithms and hashing, but the question mentions interest in DES, AES, etc and so may only be interested in symmetric encryption algorithms or all of the above - it is not clear.
$endgroup$
add a comment |
Your Answer
StackExchange.ifUsing("editor", function () {
return StackExchange.using("mathjaxEditing", function () {
StackExchange.MarkdownEditor.creationCallbacks.add(function (editor, postfix) {
StackExchange.mathjaxEditing.prepareWmdForMathJax(editor, postfix, [["$", "$"], ["\\(","\\)"]]);
});
});
}, "mathjax-editing");
StackExchange.ready(function() {
var channelOptions = {
tags: "".split(" "),
id: "281"
};
initTagRenderer("".split(" "), "".split(" "), channelOptions);
StackExchange.using("externalEditor", function() {
// Have to fire editor after snippets, if snippets enabled
if (StackExchange.settings.snippets.snippetsEnabled) {
StackExchange.using("snippets", function() {
createEditor();
});
}
else {
createEditor();
}
});
function createEditor() {
StackExchange.prepareEditor({
heartbeatType: 'answer',
autoActivateHeartbeat: false,
convertImagesToLinks: false,
noModals: true,
showLowRepImageUploadWarning: true,
reputationToPostImages: null,
bindNavPrevention: true,
postfix: "",
imageUploader: {
brandingHtml: "Powered by u003ca class="icon-imgur-white" href="https://imgur.com/"u003eu003c/au003e",
contentPolicyHtml: "User contributions licensed under u003ca href="https://creativecommons.org/licenses/by-sa/3.0/"u003ecc by-sa 3.0 with attribution requiredu003c/au003e u003ca href="https://stackoverflow.com/legal/content-policy"u003e(content policy)u003c/au003e",
allowUrls: true
},
noCode: true, onDemand: true,
discardSelector: ".discard-answer"
,immediatelyShowMarkdownHelp:true
});
}
});
Anum is a new contributor. Be nice, and check out our Code of Conduct.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f67667%2fperformance-metrices-of-des-aes-etc%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
2 Answers
2
active
oldest
votes
2 Answers
2
active
oldest
votes
active
oldest
votes
active
oldest
votes
$begingroup$
Criteria for evaluation of Cryptography Algorithms:
- Having public specification (the only secret is the key).
- Patent status.
- What it aims at: block cipher (DES, AES..), cipher, message digest, MAC, proof of origin, signature, key establishment, TRNG, PRNG.
- Requirements for and limitations of the algorithm itself.
- Randomness requirements;
- Requirements to validate the input parameters (e.g. public key for ECDH).
- Being symmetric (block ciphers, SHA) or asymmetric (RSA, ECDSA, ECDH).
- Security under some threat model:
- Resistance to key recovery (bounded at least by key size);
- Block size (for block ciphers);
- Resistance to pure cryptanalytic attacks;
- Resistance to side-channel leakage (with many subdivisions);
- Resistance to fault injection.
- Complexity and familiarity / learning curve to use the algorithm.
- Parameter sizes:
- Output size (overhead / expansion ratio);
- Encoded (public) key size;
- Accepted input sizes;
- Speed (often very platform-dependent):
- Cycles/byte averages for large messages or multiple uses with the same key;
- Time to setup a new key;
- Time versus size.
- Memory footprint:
- Code;
- RAM per running instance.
- Availability of a version with suitable characteristics as above on a given platform.
- Acceptance by security authorities.
Note: fell free to restructure / add to the list, this is a community wiki.
$endgroup$
$begingroup$
@Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
$endgroup$
– fgrieu
3 hours ago
$begingroup$
Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
$endgroup$
– Maarten Bodewes♦
2 hours ago
$begingroup$
There's a lot of useful information here, but I notice that the question asked aboutwhat are the important metrics to check the performance of Cryptography Algorithms
, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?
$endgroup$
– Ella Rose♦
58 mins ago
add a comment |
$begingroup$
Criteria for evaluation of Cryptography Algorithms:
- Having public specification (the only secret is the key).
- Patent status.
- What it aims at: block cipher (DES, AES..), cipher, message digest, MAC, proof of origin, signature, key establishment, TRNG, PRNG.
- Requirements for and limitations of the algorithm itself.
- Randomness requirements;
- Requirements to validate the input parameters (e.g. public key for ECDH).
- Being symmetric (block ciphers, SHA) or asymmetric (RSA, ECDSA, ECDH).
- Security under some threat model:
- Resistance to key recovery (bounded at least by key size);
- Block size (for block ciphers);
- Resistance to pure cryptanalytic attacks;
- Resistance to side-channel leakage (with many subdivisions);
- Resistance to fault injection.
- Complexity and familiarity / learning curve to use the algorithm.
- Parameter sizes:
- Output size (overhead / expansion ratio);
- Encoded (public) key size;
- Accepted input sizes;
- Speed (often very platform-dependent):
- Cycles/byte averages for large messages or multiple uses with the same key;
- Time to setup a new key;
- Time versus size.
- Memory footprint:
- Code;
- RAM per running instance.
- Availability of a version with suitable characteristics as above on a given platform.
- Acceptance by security authorities.
Note: fell free to restructure / add to the list, this is a community wiki.
$endgroup$
$begingroup$
@Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
$endgroup$
– fgrieu
3 hours ago
$begingroup$
Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
$endgroup$
– Maarten Bodewes♦
2 hours ago
$begingroup$
There's a lot of useful information here, but I notice that the question asked aboutwhat are the important metrics to check the performance of Cryptography Algorithms
, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?
$endgroup$
– Ella Rose♦
58 mins ago
add a comment |
$begingroup$
Criteria for evaluation of Cryptography Algorithms:
- Having public specification (the only secret is the key).
- Patent status.
- What it aims at: block cipher (DES, AES..), cipher, message digest, MAC, proof of origin, signature, key establishment, TRNG, PRNG.
- Requirements for and limitations of the algorithm itself.
- Randomness requirements;
- Requirements to validate the input parameters (e.g. public key for ECDH).
- Being symmetric (block ciphers, SHA) or asymmetric (RSA, ECDSA, ECDH).
- Security under some threat model:
- Resistance to key recovery (bounded at least by key size);
- Block size (for block ciphers);
- Resistance to pure cryptanalytic attacks;
- Resistance to side-channel leakage (with many subdivisions);
- Resistance to fault injection.
- Complexity and familiarity / learning curve to use the algorithm.
- Parameter sizes:
- Output size (overhead / expansion ratio);
- Encoded (public) key size;
- Accepted input sizes;
- Speed (often very platform-dependent):
- Cycles/byte averages for large messages or multiple uses with the same key;
- Time to setup a new key;
- Time versus size.
- Memory footprint:
- Code;
- RAM per running instance.
- Availability of a version with suitable characteristics as above on a given platform.
- Acceptance by security authorities.
Note: fell free to restructure / add to the list, this is a community wiki.
$endgroup$
Criteria for evaluation of Cryptography Algorithms:
- Having public specification (the only secret is the key).
- Patent status.
- What it aims at: block cipher (DES, AES..), cipher, message digest, MAC, proof of origin, signature, key establishment, TRNG, PRNG.
- Requirements for and limitations of the algorithm itself.
- Randomness requirements;
- Requirements to validate the input parameters (e.g. public key for ECDH).
- Being symmetric (block ciphers, SHA) or asymmetric (RSA, ECDSA, ECDH).
- Security under some threat model:
- Resistance to key recovery (bounded at least by key size);
- Block size (for block ciphers);
- Resistance to pure cryptanalytic attacks;
- Resistance to side-channel leakage (with many subdivisions);
- Resistance to fault injection.
- Complexity and familiarity / learning curve to use the algorithm.
- Parameter sizes:
- Output size (overhead / expansion ratio);
- Encoded (public) key size;
- Accepted input sizes;
- Speed (often very platform-dependent):
- Cycles/byte averages for large messages or multiple uses with the same key;
- Time to setup a new key;
- Time versus size.
- Memory footprint:
- Code;
- RAM per running instance.
- Availability of a version with suitable characteristics as above on a given platform.
- Acceptance by security authorities.
Note: fell free to restructure / add to the list, this is a community wiki.
edited 2 hours ago
community wiki
6 revs, 3 users 64%
fgrieu
$begingroup$
@Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
$endgroup$
– fgrieu
3 hours ago
$begingroup$
Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
$endgroup$
– Maarten Bodewes♦
2 hours ago
$begingroup$
There's a lot of useful information here, but I notice that the question asked aboutwhat are the important metrics to check the performance of Cryptography Algorithms
, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?
$endgroup$
– Ella Rose♦
58 mins ago
add a comment |
$begingroup$
@Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
$endgroup$
– fgrieu
3 hours ago
$begingroup$
Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
$endgroup$
– Maarten Bodewes♦
2 hours ago
$begingroup$
There's a lot of useful information here, but I notice that the question asked aboutwhat are the important metrics to check the performance of Cryptography Algorithms
, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?
$endgroup$
– Ella Rose♦
58 mins ago
$begingroup$
@Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
$endgroup$
– fgrieu
3 hours ago
$begingroup$
@Maarten Bodewes: no, the duplicate line was a glitch, but dual laser attack conceivably is a concern with cross-checking dual CPUs like in this and this [order determined by coin toss]; search CPU in these public TOEs. Community wiki are here to stop the drain of my productivity, please edit, you usually have good karma! Note: did not get the next comment.
$endgroup$
– fgrieu
3 hours ago
$begingroup$
Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
$endgroup$
– Maarten Bodewes♦
2 hours ago
$begingroup$
Ah, no, you were commenting on my previous comment, which I removed because it would otherwise put a drain on your resources :) I'll think about additions a bit more and won't contact you; you can then review the contents now and then if you like; I'll keep an eye out too.
$endgroup$
– Maarten Bodewes♦
2 hours ago
$begingroup$
There's a lot of useful information here, but I notice that the question asked about
what are the important metrics to check the performance of Cryptography Algorithms
, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?$endgroup$
– Ella Rose♦
58 mins ago
$begingroup$
There's a lot of useful information here, but I notice that the question asked about
what are the important metrics to check the performance of Cryptography Algorithms
, and some of these points appear to be wholly unrelated to performance (e.g. patent status, public specification, etc). Anyone care to enlighten me as to how these other points are relevant to what the OP asked about?$endgroup$
– Ella Rose♦
58 mins ago
add a comment |
$begingroup$
The SUPERCOP page lists the following criteria:
Hashing
Time to hash a very short packet of data.
Time to hash a typical-size Internet packet.
Time to hash a long message.
Length of the hash output.
Symmetric encryption
Time to encrypt a very short packet of data using a secret key and a nonce.
Time to encrypt a typical-size Internet packet.
Time to encrypt a long message.
Length of the secret key.
Length of the nonce.
Time for authenticated encryption of a short packet of data.
Time for authenticated encryption of a typical-size Internet packet.
Time for authenticated encryption of a long message.
Asymmetric algorithms
Time to generate a key pair (a private key and a corresponding public key).
Length of the private key.
Length of the public key.
Time to generate a shared secret from a private key and another user's public key.
Length of the shared secret.
Time to encrypt a message using a public key.
Length of the encrypted message.
Time to decrypt a message using a private key.
Time to sign a message using a private key.
Length of the signed message.
Time to verify a signed message using a public key.
MACs
Curiously, MACs do not appear to be measured with SUPERCOP. AEAD schemes may include them, but there is not standalone category for measuring MACs. Some relevant metrics might be:
- Key size
- Time to evaluate on small messages
- Time to evaluate on large messages
Other metrics
Another standard metric (as mentioned in another answer) is cycles per byte. This is a measurement of how many CPU cycles it took to perform the operation per each byte of input.
I suspect that power consumption may also be a relevant metric, considering the prevalence of mobile/IoT devices.
Throughput is a common metric, which is the amount of data per unit of time (e.g. second) that a system can process.
As mentioned in the other answer (again), many of these metrics will be platform dependent.
Note
The above includes metrics used for asymmetric algorithms and hashing, but the question mentions interest in DES, AES, etc and so may only be interested in symmetric encryption algorithms or all of the above - it is not clear.
$endgroup$
add a comment |
$begingroup$
The SUPERCOP page lists the following criteria:
Hashing
Time to hash a very short packet of data.
Time to hash a typical-size Internet packet.
Time to hash a long message.
Length of the hash output.
Symmetric encryption
Time to encrypt a very short packet of data using a secret key and a nonce.
Time to encrypt a typical-size Internet packet.
Time to encrypt a long message.
Length of the secret key.
Length of the nonce.
Time for authenticated encryption of a short packet of data.
Time for authenticated encryption of a typical-size Internet packet.
Time for authenticated encryption of a long message.
Asymmetric algorithms
Time to generate a key pair (a private key and a corresponding public key).
Length of the private key.
Length of the public key.
Time to generate a shared secret from a private key and another user's public key.
Length of the shared secret.
Time to encrypt a message using a public key.
Length of the encrypted message.
Time to decrypt a message using a private key.
Time to sign a message using a private key.
Length of the signed message.
Time to verify a signed message using a public key.
MACs
Curiously, MACs do not appear to be measured with SUPERCOP. AEAD schemes may include them, but there is not standalone category for measuring MACs. Some relevant metrics might be:
- Key size
- Time to evaluate on small messages
- Time to evaluate on large messages
Other metrics
Another standard metric (as mentioned in another answer) is cycles per byte. This is a measurement of how many CPU cycles it took to perform the operation per each byte of input.
I suspect that power consumption may also be a relevant metric, considering the prevalence of mobile/IoT devices.
Throughput is a common metric, which is the amount of data per unit of time (e.g. second) that a system can process.
As mentioned in the other answer (again), many of these metrics will be platform dependent.
Note
The above includes metrics used for asymmetric algorithms and hashing, but the question mentions interest in DES, AES, etc and so may only be interested in symmetric encryption algorithms or all of the above - it is not clear.
$endgroup$
add a comment |
$begingroup$
The SUPERCOP page lists the following criteria:
Hashing
Time to hash a very short packet of data.
Time to hash a typical-size Internet packet.
Time to hash a long message.
Length of the hash output.
Symmetric encryption
Time to encrypt a very short packet of data using a secret key and a nonce.
Time to encrypt a typical-size Internet packet.
Time to encrypt a long message.
Length of the secret key.
Length of the nonce.
Time for authenticated encryption of a short packet of data.
Time for authenticated encryption of a typical-size Internet packet.
Time for authenticated encryption of a long message.
Asymmetric algorithms
Time to generate a key pair (a private key and a corresponding public key).
Length of the private key.
Length of the public key.
Time to generate a shared secret from a private key and another user's public key.
Length of the shared secret.
Time to encrypt a message using a public key.
Length of the encrypted message.
Time to decrypt a message using a private key.
Time to sign a message using a private key.
Length of the signed message.
Time to verify a signed message using a public key.
MACs
Curiously, MACs do not appear to be measured with SUPERCOP. AEAD schemes may include them, but there is not standalone category for measuring MACs. Some relevant metrics might be:
- Key size
- Time to evaluate on small messages
- Time to evaluate on large messages
Other metrics
Another standard metric (as mentioned in another answer) is cycles per byte. This is a measurement of how many CPU cycles it took to perform the operation per each byte of input.
I suspect that power consumption may also be a relevant metric, considering the prevalence of mobile/IoT devices.
Throughput is a common metric, which is the amount of data per unit of time (e.g. second) that a system can process.
As mentioned in the other answer (again), many of these metrics will be platform dependent.
Note
The above includes metrics used for asymmetric algorithms and hashing, but the question mentions interest in DES, AES, etc and so may only be interested in symmetric encryption algorithms or all of the above - it is not clear.
$endgroup$
The SUPERCOP page lists the following criteria:
Hashing
Time to hash a very short packet of data.
Time to hash a typical-size Internet packet.
Time to hash a long message.
Length of the hash output.
Symmetric encryption
Time to encrypt a very short packet of data using a secret key and a nonce.
Time to encrypt a typical-size Internet packet.
Time to encrypt a long message.
Length of the secret key.
Length of the nonce.
Time for authenticated encryption of a short packet of data.
Time for authenticated encryption of a typical-size Internet packet.
Time for authenticated encryption of a long message.
Asymmetric algorithms
Time to generate a key pair (a private key and a corresponding public key).
Length of the private key.
Length of the public key.
Time to generate a shared secret from a private key and another user's public key.
Length of the shared secret.
Time to encrypt a message using a public key.
Length of the encrypted message.
Time to decrypt a message using a private key.
Time to sign a message using a private key.
Length of the signed message.
Time to verify a signed message using a public key.
MACs
Curiously, MACs do not appear to be measured with SUPERCOP. AEAD schemes may include them, but there is not standalone category for measuring MACs. Some relevant metrics might be:
- Key size
- Time to evaluate on small messages
- Time to evaluate on large messages
Other metrics
Another standard metric (as mentioned in another answer) is cycles per byte. This is a measurement of how many CPU cycles it took to perform the operation per each byte of input.
I suspect that power consumption may also be a relevant metric, considering the prevalence of mobile/IoT devices.
Throughput is a common metric, which is the amount of data per unit of time (e.g. second) that a system can process.
As mentioned in the other answer (again), many of these metrics will be platform dependent.
Note
The above includes metrics used for asymmetric algorithms and hashing, but the question mentions interest in DES, AES, etc and so may only be interested in symmetric encryption algorithms or all of the above - it is not clear.
edited 26 secs ago
answered 25 mins ago
Ella Rose♦Ella Rose
16.3k44281
16.3k44281
add a comment |
add a comment |
Anum is a new contributor. Be nice, and check out our Code of Conduct.
Anum is a new contributor. Be nice, and check out our Code of Conduct.
Anum is a new contributor. Be nice, and check out our Code of Conduct.
Anum is a new contributor. Be nice, and check out our Code of Conduct.
Thanks for contributing an answer to Cryptography Stack Exchange!
- Please be sure to answer the question. Provide details and share your research!
But avoid …
- Asking for help, clarification, or responding to other answers.
- Making statements based on opinion; back them up with references or personal experience.
Use MathJax to format equations. MathJax reference.
To learn more, see our tips on writing great answers.
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
StackExchange.ready(
function () {
StackExchange.openid.initPostLogin('.new-post-login', 'https%3a%2f%2fcrypto.stackexchange.com%2fquestions%2f67667%2fperformance-metrices-of-des-aes-etc%23new-answer', 'question_page');
}
);
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Sign up or log in
StackExchange.ready(function () {
StackExchange.helpers.onClickDraftSave('#login-link');
});
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Sign up using Google
Sign up using Facebook
Sign up using Email and Password
Post as a guest
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
Required, but never shown
1
$begingroup$
Money, money, money...
$endgroup$
– kelalaka
4 hours ago
$begingroup$
@kelalaka It appears not. I tried appealing to the pocket with Finding flaw in cryptographic protocol and got spanked.
$endgroup$
– Paul Uszak
3 hours ago
$begingroup$
@PaulUszak That was for an action that would be considered negative / going to the dark side by most of the cryptographic community. Money is nice to have, but fortunately a lot of people (apparently including many cryptographers) put morale still above money. Of course if you find selling vulnerabilities to the authority of your choice morale right or wrong depends on your point of view (which is why I didn't up- or downvote it).
$endgroup$
– Maarten Bodewes♦
3 hours ago