mirror of
https://github.com/henrydcase/pqc.git
synced 2024-11-27 01:41:40 +00:00
frodo: move benchmarks to separated file
This commit is contained in:
parent
286414feca
commit
e57a891583
@ -10,6 +10,7 @@ endif()
|
|||||||
|
|
||||||
add_executable(
|
add_executable(
|
||||||
bench
|
bench
|
||||||
|
frodo.cc
|
||||||
kyber.cc)
|
kyber.cc)
|
||||||
|
|
||||||
target_link_libraries(
|
target_link_libraries(
|
||||||
|
37
test/bench/frodo.cc
Normal file
37
test/bench/frodo.cc
Normal file
@ -0,0 +1,37 @@
|
|||||||
|
#include <array>
|
||||||
|
#include <stdint.h>
|
||||||
|
#include <utility>
|
||||||
|
|
||||||
|
#include <benchmark/benchmark.h>
|
||||||
|
#include <benchmark/../../src/statistics.h>
|
||||||
|
#include <benchmark/../../src/cycleclock.h>
|
||||||
|
|
||||||
|
#include <pqc/pqc.h>
|
||||||
|
#include <common/ct_check.h>
|
||||||
|
|
||||||
|
static void BenchFrodoDecaps(benchmark::State &st) {
|
||||||
|
const pqc_ctx_t *p = pqc_kem_alg_by_id(PQC_ALG_KEM_FRODOKEM640SHAKE);
|
||||||
|
std::vector<uint8_t> ct(pqc_ciphertext_bsz(p));
|
||||||
|
std::vector<uint8_t> ss1(pqc_shared_secret_bsz(p));
|
||||||
|
std::vector<uint8_t> ss2(pqc_shared_secret_bsz(p));
|
||||||
|
std::vector<uint8_t> sk(pqc_private_key_bsz(p));
|
||||||
|
std::vector<uint8_t> pk(pqc_public_key_bsz(p));
|
||||||
|
|
||||||
|
// Generate keys & perform encapsulation
|
||||||
|
pqc_keygen(p, pk.data(), sk.data());
|
||||||
|
pqc_kem_encapsulate(p, ct.data(), ss1.data(), pk.data());
|
||||||
|
|
||||||
|
// Poison & Decapsulate
|
||||||
|
ct_poison(sk.data(), 16);
|
||||||
|
ct_poison((unsigned char*)sk.data()+16+9616, 2*640*8 /*CRYPTO_SECRETBYTES*/);
|
||||||
|
ct_expect_uum();
|
||||||
|
for (auto _ : st) {
|
||||||
|
pqc_kem_decapsulate(p, ss2.data(), ct.data(), sk.data());
|
||||||
|
}
|
||||||
|
ct_require_uum();
|
||||||
|
benchmark::DoNotOptimize(ss2);
|
||||||
|
benchmark::DoNotOptimize(ct);
|
||||||
|
benchmark::DoNotOptimize(sk);
|
||||||
|
}
|
||||||
|
|
||||||
|
BENCHMARK(BenchFrodoDecaps);
|
@ -6,9 +6,6 @@
|
|||||||
#include <benchmark/../../src/statistics.h>
|
#include <benchmark/../../src/statistics.h>
|
||||||
#include <benchmark/../../src/cycleclock.h>
|
#include <benchmark/../../src/cycleclock.h>
|
||||||
|
|
||||||
#include <pqc/pqc.h>
|
|
||||||
#include <common/ct_check.h>
|
|
||||||
|
|
||||||
#include "kem/kyber/kyber512/avx2/polyvec.h"
|
#include "kem/kyber/kyber512/avx2/polyvec.h"
|
||||||
|
|
||||||
extern "C" {
|
extern "C" {
|
||||||
@ -121,32 +118,6 @@ static void BenchKyberNttAVX(benchmark::State &st) {
|
|||||||
cpucycle(st, total);
|
cpucycle(st, total);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void BenchFrodoDecaps(benchmark::State &st) {
|
|
||||||
const pqc_ctx_t *p = pqc_kem_alg_by_id(PQC_ALG_KEM_FRODOKEM640SHAKE);
|
|
||||||
std::vector<uint8_t> ct(pqc_ciphertext_bsz(p));
|
|
||||||
std::vector<uint8_t> ss1(pqc_shared_secret_bsz(p));
|
|
||||||
std::vector<uint8_t> ss2(pqc_shared_secret_bsz(p));
|
|
||||||
std::vector<uint8_t> sk(pqc_private_key_bsz(p));
|
|
||||||
std::vector<uint8_t> pk(pqc_public_key_bsz(p));
|
|
||||||
|
|
||||||
// Generate keys & perform encapsulation
|
|
||||||
pqc_keygen(p, pk.data(), sk.data());
|
|
||||||
pqc_kem_encapsulate(p, ct.data(), ss1.data(), pk.data());
|
|
||||||
|
|
||||||
// Poison & Decapsulate
|
|
||||||
ct_poison(sk.data(), 16);
|
|
||||||
ct_poison((unsigned char*)sk.data()+16+9616, 2*640*8 /*CRYPTO_SECRETBYTES*/);
|
|
||||||
ct_expect_uum();
|
|
||||||
for (auto _ : st) {
|
|
||||||
pqc_kem_decapsulate(p, ss2.data(), ct.data(), sk.data());
|
|
||||||
}
|
|
||||||
ct_require_uum();
|
|
||||||
benchmark::DoNotOptimize(ss2);
|
|
||||||
benchmark::DoNotOptimize(ct);
|
|
||||||
benchmark::DoNotOptimize(sk);
|
|
||||||
}
|
|
||||||
|
|
||||||
|
|
||||||
BENCHMARK(BenchKyberMatK2);
|
BENCHMARK(BenchKyberMatK2);
|
||||||
BENCHMARK(BenchKyberRejSampling);
|
BENCHMARK(BenchKyberRejSampling);
|
||||||
BENCHMARK(BenchKyberKeygen);
|
BENCHMARK(BenchKyberKeygen);
|
||||||
@ -156,4 +127,3 @@ BENCHMARK(BenchKyberNttAVX);
|
|||||||
// TODO: not sure why but memcheck fails in INDCPA encryption
|
// TODO: not sure why but memcheck fails in INDCPA encryption
|
||||||
BENCHMARK(BenchKyberEncaps);
|
BENCHMARK(BenchKyberEncaps);
|
||||||
BENCHMARK(BenchKyberDecaps);
|
BENCHMARK(BenchKyberDecaps);
|
||||||
BENCHMARK(BenchFrodoDecaps);
|
|
Loading…
Reference in New Issue
Block a user