gnunet-svn
[Top][All Lists]
Advanced

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[GNUnet-SVN] r36291 - gnunet/src/util


From: gnunet
Subject: [GNUnet-SVN] r36291 - gnunet/src/util
Date: Thu, 3 Sep 2015 16:19:46 +0200

Author: grothoff
Date: 2015-09-03 16:19:46 +0200 (Thu, 03 Sep 2015)
New Revision: 36291

Added:
   gnunet/src/util/perf_crypto_rsa.c
Modified:
   gnunet/src/util/Makefile.am
   gnunet/src/util/crypto_rsa.c
Log:
-add benchmark for RSA crypto

Modified: gnunet/src/util/Makefile.am
===================================================================
--- gnunet/src/util/Makefile.am 2015-09-02 14:45:28 UTC (rev 36290)
+++ gnunet/src/util/Makefile.am 2015-09-03 14:19:46 UTC (rev 36291)
@@ -248,6 +248,7 @@
 if HAVE_BENCHMARKS
  BENCHMARKS = \
   perf_crypto_hash \
+  perf_crypto_rsa \
   perf_crypto_paillier \
   perf_crypto_symmetric \
   perf_crypto_asymmetric \
@@ -626,6 +627,11 @@
 perf_crypto_hash_LDADD = \
  libgnunetutil.la
 
+perf_crypto_rsa_SOURCES = \
+ perf_crypto_rsa.c
+perf_crypto_rsa_LDADD = \
+ libgnunetutil.la
+
 perf_crypto_symmetric_SOURCES = \
  perf_crypto_symmetric.c
 perf_crypto_symmetric_LDADD = \

Modified: gnunet/src/util/crypto_rsa.c
===================================================================
--- gnunet/src/util/crypto_rsa.c        2015-09-02 14:45:28 UTC (rev 36290)
+++ gnunet/src/util/crypto_rsa.c        2015-09-03 14:19:46 UTC (rev 36291)
@@ -608,7 +608,7 @@
  */
 struct GNUNET_CRYPTO_rsa_BlindingKey *
 GNUNET_CRYPTO_rsa_blinding_key_decode (const char *buf,
-                               size_t len)
+                                       size_t len)
 {
   struct GNUNET_CRYPTO_rsa_BlindingKey *bkey;
   size_t rsize;
@@ -753,6 +753,7 @@
                        size_t msg_len)
 {
   struct GNUNET_CRYPTO_rsa_Signature *sig;
+  struct GNUNET_CRYPTO_rsa_PublicKey *public_key;
   gcry_sexp_t result;
   gcry_sexp_t data;
 
@@ -766,6 +767,23 @@
     GNUNET_break (0);
     return NULL;
   }
+
+  /* verify signature (guards against Lenstra's attack with fault 
injection...) */
+  public_key = GNUNET_CRYPTO_rsa_private_key_get_public (key);
+  if (0 !=
+      gcry_pk_verify (result,
+                      data,
+                      public_key->sexp))
+  {
+    GNUNET_break (0);
+    GNUNET_CRYPTO_rsa_public_key_free (public_key);
+    gcry_sexp_release (data);
+    gcry_sexp_release (result);
+    return NULL;
+  }
+  GNUNET_CRYPTO_rsa_public_key_free (public_key);
+
+  /* return signature */
   gcry_sexp_release (data);
   sig = GNUNET_new (struct GNUNET_CRYPTO_rsa_Signature);
   sig->sexp = result;

Added: gnunet/src/util/perf_crypto_rsa.c
===================================================================
--- gnunet/src/util/perf_crypto_rsa.c                           (rev 0)
+++ gnunet/src/util/perf_crypto_rsa.c   2015-09-03 14:19:46 UTC (rev 36291)
@@ -0,0 +1,204 @@
+/*
+     This file is part of GNUnet.
+     Copyright (C) 2014 Christian Grothoff (and other contributing authors)
+
+     GNUnet is free software; you can redistribute it and/or modify
+     it under the terms of the GNU General Public License as published
+     by the Free Software Foundation; either version 3, or (at your
+     option) any later version.
+
+     GNUnet is distributed in the hope that it will be useful, but
+     WITHOUT ANY WARRANTY; without even the implied warranty of
+     MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU
+     General Public License for more details.
+
+     You should have received a copy of the GNU General Public License
+     along with GNUnet; see the file COPYING.  If not, write to the
+     Free Software Foundation, Inc., 51 Franklin Street, Fifth Floor,
+     Boston, MA 02110-1301, USA.
+*/
+
+/**
+ * @author Christian Grothoff
+ * @file util/perf_crypto_rsa.c
+ * @brief measure performance of RSA signing
+ */
+#include "platform.h"
+#include "gnunet_util_lib.h"
+#include <gauger.h>
+
+
+/**
+ * Evaluate RSA performance.
+ *
+ * @param len keylength to evaluate with
+ */
+static void
+eval (unsigned int len)
+{
+  struct GNUNET_TIME_Absolute start;
+  struct GNUNET_CRYPTO_rsa_Signature *sig;
+  struct GNUNET_CRYPTO_rsa_Signature *rsig;
+  struct GNUNET_CRYPTO_rsa_PublicKey *public_key;
+  struct GNUNET_CRYPTO_rsa_PrivateKey *private_key;
+  struct GNUNET_CRYPTO_rsa_BlindingKey *bkey;
+  unsigned int i;
+  char sbuf[128];
+  char *bbuf;
+  size_t bbuf_len;
+  struct GNUNET_HashCode hc;
+
+  start = GNUNET_TIME_absolute_get ();
+  for (i=0;i<10;i++)
+  {
+    private_key = GNUNET_CRYPTO_rsa_private_key_create (len);
+    GNUNET_CRYPTO_rsa_private_key_free (private_key);
+  }
+  printf ("10x %u-key generation took %s\n",
+          len,
+          GNUNET_STRINGS_relative_time_to_string 
(GNUNET_TIME_absolute_get_duration (start),
+                                                  GNUNET_YES));
+  GNUNET_snprintf (sbuf,
+                   sizeof (sbuf),
+                   "RSA %u-key generation",
+                   len);
+  GAUGER ("UTIL", sbuf,
+          64 * 1024 / (1 +
+                       GNUNET_TIME_absolute_get_duration
+                       (start).rel_value_us / 1000LL), "keys/ms");
+  private_key = GNUNET_CRYPTO_rsa_private_key_create (len);
+  public_key = GNUNET_CRYPTO_rsa_private_key_get_public (private_key);
+  start = GNUNET_TIME_absolute_get ();
+  for (i=0;i<10;i++)
+  {
+    bkey = GNUNET_CRYPTO_rsa_blinding_key_create (len);
+    GNUNET_CRYPTO_rsa_blinding_key_free (bkey);
+  }
+  printf ("10x %u-blinding key generation took %s\n",
+          len,
+          GNUNET_STRINGS_relative_time_to_string 
(GNUNET_TIME_absolute_get_duration (start),
+                                                  GNUNET_YES));
+  GNUNET_snprintf (sbuf,
+                   sizeof (sbuf),
+                   "RSA %u-blinding key generation",
+                   len);
+  GAUGER ("UTIL", sbuf,
+          64 * 1024 / (1 +
+                       GNUNET_TIME_absolute_get_duration
+                       (start).rel_value_us / 1000LL), "keys/ms");
+  bkey = GNUNET_CRYPTO_rsa_blinding_key_create (len);
+  start = GNUNET_TIME_absolute_get ();
+  GNUNET_CRYPTO_hash ("test", 4, &hc);
+  for (i=0;i<10;i++)
+  {
+    bbuf_len = GNUNET_CRYPTO_rsa_blind (&hc,
+                                        bkey,
+                                        public_key,
+                                        &bbuf);
+    GNUNET_free (bbuf);
+  }
+  printf ("10x %u-blinding took %s\n",
+          len,
+          GNUNET_STRINGS_relative_time_to_string 
(GNUNET_TIME_absolute_get_duration (start),
+                                                 GNUNET_YES));
+  GNUNET_snprintf (sbuf,
+                   sizeof (sbuf),
+                   "RSA %u-blinding",
+                   len);
+  GAUGER ("UTIL",
+          sbuf,
+          64 * 1024 / (1 +
+                      GNUNET_TIME_absolute_get_duration
+                      (start).rel_value_us / 1000LL), "ops/ms");
+  bbuf_len = GNUNET_CRYPTO_rsa_blind (&hc,
+                                      bkey,
+                                      public_key,
+                                      &bbuf);
+  start = GNUNET_TIME_absolute_get ();
+  for (i=0;i<10;i++)
+  {
+    sig = GNUNET_CRYPTO_rsa_sign (private_key,
+                                  bbuf,
+                                  bbuf_len);
+    GNUNET_CRYPTO_rsa_signature_free (sig);
+  }
+  printf ("10x %u-signing took %s\n",
+          len,
+          GNUNET_STRINGS_relative_time_to_string 
(GNUNET_TIME_absolute_get_duration (start),
+                                                 GNUNET_YES));
+  GNUNET_snprintf (sbuf,
+                   sizeof (sbuf),
+                   "RSA %u-signing",
+                   len);
+  GAUGER ("UTIL",
+          sbuf,
+          64 * 1024 / (1 +
+                      GNUNET_TIME_absolute_get_duration
+                      (start).rel_value_us / 1000LL), "ops/ms");
+  sig = GNUNET_CRYPTO_rsa_sign (private_key,
+                                bbuf,
+                                bbuf_len);
+  start = GNUNET_TIME_absolute_get ();
+  for (i=0;i<10;i++)
+  {
+    rsig = GNUNET_CRYPTO_rsa_unblind (sig,
+                                      bkey,
+                                      public_key);
+    GNUNET_CRYPTO_rsa_signature_free (rsig);
+  }
+  printf ("10x %u-unblinding took %s\n",
+          len,
+          GNUNET_STRINGS_relative_time_to_string 
(GNUNET_TIME_absolute_get_duration (start),
+                                                 GNUNET_YES));
+  GNUNET_snprintf (sbuf,
+                   sizeof (sbuf),
+                   "RSA %u-unblinding",
+                   len);
+  GAUGER ("UTIL",
+          sbuf,
+          64 * 1024 / (1 +
+                      GNUNET_TIME_absolute_get_duration
+                      (start).rel_value_us / 1000LL), "ops/ms");
+  rsig = GNUNET_CRYPTO_rsa_unblind (sig,
+                                    bkey,
+                                    public_key);
+  start = GNUNET_TIME_absolute_get ();
+  for (i=0;i<10;i++)
+  {
+    GNUNET_assert (GNUNET_OK ==
+                   GNUNET_CRYPTO_rsa_verify (&hc,
+                                             rsig,
+                                             public_key));
+  }
+  printf ("10x %u-verifying took %s\n",
+          len,
+          GNUNET_STRINGS_relative_time_to_string 
(GNUNET_TIME_absolute_get_duration (start),
+                                                 GNUNET_YES));
+  GNUNET_snprintf (sbuf,
+                   sizeof (sbuf),
+                   "RSA %u-verification",
+                   len);
+  GAUGER ("UTIL",
+          sbuf,
+          64 * 1024 / (1 +
+                      GNUNET_TIME_absolute_get_duration
+                      (start).rel_value_us / 1000LL), "ops/ms");
+  GNUNET_CRYPTO_rsa_signature_free (sig);
+  GNUNET_CRYPTO_rsa_public_key_free (public_key);
+  GNUNET_CRYPTO_rsa_private_key_free (private_key);
+  GNUNET_CRYPTO_rsa_blinding_key_free (bkey);
+  GNUNET_free (bbuf);
+}
+
+
+int
+main (int argc, char *argv[])
+{
+  eval (1024);
+  eval (2048);
+  /* eval (4096); */
+  return 0;
+}
+
+
+/* end of perf_crypto_rsa.c */




reply via email to

[Prev in Thread] Current Thread [Next in Thread]