1
1
mirror of https://github.com/henrydcase/pqc.git synced 2024-11-23 07:59:01 +00:00

frodo: move benchmarks to separated file

This commit is contained in:
Henry Case 2021-07-17 00:20:45 +01:00
parent 286414feca
commit e57a891583
3 changed files with 38 additions and 30 deletions

View File

@ -10,6 +10,7 @@ endif()
add_executable( add_executable(
bench bench
frodo.cc
kyber.cc) kyber.cc)
target_link_libraries( target_link_libraries(

37
test/bench/frodo.cc Normal file
View File

@ -0,0 +1,37 @@
#include <array>
#include <stdint.h>
#include <utility>
#include <benchmark/benchmark.h>
#include <benchmark/../../src/statistics.h>
#include <benchmark/../../src/cycleclock.h>
#include <pqc/pqc.h>
#include <common/ct_check.h>
static void BenchFrodoDecaps(benchmark::State &st) {
const pqc_ctx_t *p = pqc_kem_alg_by_id(PQC_ALG_KEM_FRODOKEM640SHAKE);
std::vector<uint8_t> ct(pqc_ciphertext_bsz(p));
std::vector<uint8_t> ss1(pqc_shared_secret_bsz(p));
std::vector<uint8_t> ss2(pqc_shared_secret_bsz(p));
std::vector<uint8_t> sk(pqc_private_key_bsz(p));
std::vector<uint8_t> pk(pqc_public_key_bsz(p));
// Generate keys & perform encapsulation
pqc_keygen(p, pk.data(), sk.data());
pqc_kem_encapsulate(p, ct.data(), ss1.data(), pk.data());
// Poison & Decapsulate
ct_poison(sk.data(), 16);
ct_poison((unsigned char*)sk.data()+16+9616, 2*640*8 /*CRYPTO_SECRETBYTES*/);
ct_expect_uum();
for (auto _ : st) {
pqc_kem_decapsulate(p, ss2.data(), ct.data(), sk.data());
}
ct_require_uum();
benchmark::DoNotOptimize(ss2);
benchmark::DoNotOptimize(ct);
benchmark::DoNotOptimize(sk);
}
BENCHMARK(BenchFrodoDecaps);

View File

@ -6,9 +6,6 @@
#include <benchmark/../../src/statistics.h> #include <benchmark/../../src/statistics.h>
#include <benchmark/../../src/cycleclock.h> #include <benchmark/../../src/cycleclock.h>
#include <pqc/pqc.h>
#include <common/ct_check.h>
#include "kem/kyber/kyber512/avx2/polyvec.h" #include "kem/kyber/kyber512/avx2/polyvec.h"
extern "C" { extern "C" {
@ -121,32 +118,6 @@ static void BenchKyberNttAVX(benchmark::State &st) {
cpucycle(st, total); cpucycle(st, total);
} }
static void BenchFrodoDecaps(benchmark::State &st) {
const pqc_ctx_t *p = pqc_kem_alg_by_id(PQC_ALG_KEM_FRODOKEM640SHAKE);
std::vector<uint8_t> ct(pqc_ciphertext_bsz(p));
std::vector<uint8_t> ss1(pqc_shared_secret_bsz(p));
std::vector<uint8_t> ss2(pqc_shared_secret_bsz(p));
std::vector<uint8_t> sk(pqc_private_key_bsz(p));
std::vector<uint8_t> pk(pqc_public_key_bsz(p));
// Generate keys & perform encapsulation
pqc_keygen(p, pk.data(), sk.data());
pqc_kem_encapsulate(p, ct.data(), ss1.data(), pk.data());
// Poison & Decapsulate
ct_poison(sk.data(), 16);
ct_poison((unsigned char*)sk.data()+16+9616, 2*640*8 /*CRYPTO_SECRETBYTES*/);
ct_expect_uum();
for (auto _ : st) {
pqc_kem_decapsulate(p, ss2.data(), ct.data(), sk.data());
}
ct_require_uum();
benchmark::DoNotOptimize(ss2);
benchmark::DoNotOptimize(ct);
benchmark::DoNotOptimize(sk);
}
BENCHMARK(BenchKyberMatK2); BENCHMARK(BenchKyberMatK2);
BENCHMARK(BenchKyberRejSampling); BENCHMARK(BenchKyberRejSampling);
BENCHMARK(BenchKyberKeygen); BENCHMARK(BenchKyberKeygen);
@ -156,4 +127,3 @@ BENCHMARK(BenchKyberNttAVX);
// TODO: not sure why but memcheck fails in INDCPA encryption // TODO: not sure why but memcheck fails in INDCPA encryption
BENCHMARK(BenchKyberEncaps); BENCHMARK(BenchKyberEncaps);
BENCHMARK(BenchKyberDecaps); BENCHMARK(BenchKyberDecaps);
BENCHMARK(BenchFrodoDecaps);