-
Notifications
You must be signed in to change notification settings - Fork 0
ChaCha20 vs AES‐256 Benchmark
See PDF
This uses this code:
Description:
The document "ChaCha20 vs AES-256" presents a comparative analysis of cryptographic performance between ChaCha20 and AES-256 encryption algorithms across different hardware platforms. Here's a detailed description of the information and results contained in the document:
-
Performance Metrics: The document provides performance data in nanoseconds per operation (ns/op) for both ChaCha20 and AES-256 on various hardware configurations:
- AMD Ryzen 9 5900X: ChaCha20 runs slower than AES-256 with 8,968,840 ns/op versus 7,740,351 ns/op respectively.
- Neoverse-N1 KVM (2vCores, shared, Hetzner): Performance is closer, with ChaCha20 slightly outperforming AES-256 (5,820,013 ns/op vs 5,526,546 ns/op).
- Intel Xeon Processor KVM (1vCore, shared, Hetzner): Similar trend where ChaCha20 is slower than AES-256 (29,455,098 ns/op vs 28,523,328 ns/op).
-
Hardware Specifications:
- AMD Ryzen 9 5900X: Details include architecture (x86_64), CPU operation modes, physical and virtual address sizes, vendor ID, model, core, socket details, frequency information, supported instruction sets, cache information, and vulnerability mitigations.
- Neoverse-N1 KVM: Lists similar details but for ARM architecture, including vendor ID, model name, BIOS details, BogoMIPS, flags, and NUMA node information.
- Intel Xeon Processor KVM: Specifications detail the architecture, CPU operation modes, byte order, address sizes, physical layout, clock speed, cache sizes, hypervisor details, and comprehensive vulnerability mitigation measures.
-
Vulnerabilities: Each processor's security vulnerabilities and their mitigations are discussed. This includes vulnerabilities like Meltdown, Spectre (versions 1 and 2), and others, along with their specific mitigations such as speculative store bypass, data sampling, and more.
This benchmarking analysis helps in understanding how each cryptographic algorithm performs under different system architectures and setups, providing valuable insights for making informed decisions on cryptographic implementations based on hardware capabilities and security features.