⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 bench2.cpp

📁 lots Elliptic curve cryptography codes. Use Visual c++ to compile
💻 CPP
字号:
// bench2.cpp - written and placed in the public domain by Wei Dai#include "bench.h"#include "rng.h"#include "files.h"#include "hex.h"#include "rsa.h"#include "nr.h"#include "dsa.h"#include "luc.h"#include "rw.h"#include "eccrypto.h"#include "ecp.h"#include "ec2n.h"#include "asn.h"#include "dh.h"#include "mqv.h"#include "xtrcrypt.h"#include "esign.h"#include "pssr.h"#include "oids.h"#include "randpool.h"#include <time.h>#include <math.h>#include <iostream>#include <iomanip>USING_NAMESPACE(CryptoPP)USING_NAMESPACE(std)void OutputResultOperations(const char *name, const char *operation, bool pc, unsigned long iterations, double timeTaken);void BenchMarkEncryption(const char *name, PK_Encryptor &key, double timeTotal, bool pc=false){	unsigned int len = 16;	LC_RNG rng((word32)time(NULL));	SecByteBlock plaintext(len), ciphertext(key.CiphertextLength(len));	rng.GenerateBlock(plaintext, len);	clock_t start = clock();	unsigned int i;	double timeTaken;	for (timeTaken=(double)0, i=0; timeTaken < timeTotal; timeTaken = double(clock() - start) / CLOCK_TICKS_PER_SECOND, i++)		key.Encrypt(rng, plaintext, len, ciphertext);	OutputResultOperations(name, "Encryption", pc, i, timeTaken);	if (!pc && key.GetMaterial().SupportsPrecomputation())	{		key.AccessMaterial().Precompute(16);		BenchMarkEncryption(name, key, timeTotal, true);	}}void BenchMarkDecryption(const char *name, PK_Decryptor &priv, PK_Encryptor &pub, double timeTotal){	unsigned int len = 16;	LC_RNG rng((word32)time(NULL));	SecByteBlock ciphertext(pub.CiphertextLength(len));	SecByteBlock plaintext(pub.MaxPlaintextLength(ciphertext.size()));	rng.GenerateBlock(plaintext, len);	pub.Encrypt(rng, plaintext, len, ciphertext);	clock_t start = clock();	unsigned int i;	double timeTaken;	for (timeTaken=(double)0, i=0; timeTaken < timeTotal; timeTaken = double(clock() - start) / CLOCK_TICKS_PER_SECOND, i++)		priv.Decrypt(rng, ciphertext, ciphertext.size(), plaintext);	OutputResultOperations(name, "Decryption", false, i, timeTaken);}void BenchMarkSigning(const char *name, PK_Signer &key, double timeTotal, bool pc=false){	unsigned int len = 16;	LC_RNG rng((word32)time(NULL));	AlignedSecByteBlock message(len), signature(key.SignatureLength());	rng.GenerateBlock(message, len);	clock_t start = clock();	unsigned int i;	double timeTaken;	for (timeTaken=(double)0, i=0; timeTaken < timeTotal; timeTaken = double(clock() - start) / CLOCK_TICKS_PER_SECOND, i++)		key.SignMessage(rng, message, len, signature);	OutputResultOperations(name, "Signature", pc, i, timeTaken);	if (!pc && key.GetMaterial().SupportsPrecomputation())	{		key.AccessMaterial().Precompute(16);		BenchMarkSigning(name, key, timeTotal, true);	}}void BenchMarkVerification(const char *name, const PK_Signer &priv, PK_Verifier &pub, double timeTotal, bool pc=false){	unsigned int len = 16;	LC_RNG rng((word32)time(NULL));	AlignedSecByteBlock message(len), signature(pub.SignatureLength());	rng.GenerateBlock(message, len);	priv.SignMessage(rng, message, len, signature);	clock_t start = clock();	unsigned int i;	double timeTaken;	for (timeTaken=(double)0, i=0; timeTaken < timeTotal; timeTaken = double(clock() - start) / CLOCK_TICKS_PER_SECOND, i++)		pub.VerifyMessage(message, len, signature, signature.size());	OutputResultOperations(name, "Verification", pc, i, timeTaken);	if (!pc && pub.GetMaterial().SupportsPrecomputation())	{		pub.AccessMaterial().Precompute(16);		BenchMarkVerification(name, priv, pub, timeTotal, true);	}}void BenchMarkKeyGen(const char *name, SimpleKeyAgreementDomain &d, double timeTotal, bool pc=false){	LC_RNG rng((word32)time(NULL));	SecByteBlock priv(d.PrivateKeyLength()), pub(d.PublicKeyLength());	clock_t start = clock();	unsigned int i;	double timeTaken;	for (timeTaken=(double)0, i=0; timeTaken < timeTotal; timeTaken = double(clock() - start) / CLOCK_TICKS_PER_SECOND, i++)		d.GenerateKeyPair(rng, priv, pub);	OutputResultOperations(name, "Key-Pair Generation", pc, i, timeTaken);	if (!pc && d.GetMaterial().SupportsPrecomputation())	{		d.AccessMaterial().Precompute(16);		BenchMarkKeyGen(name, d, timeTotal, true);	}}void BenchMarkKeyGen(const char *name, AuthenticatedKeyAgreementDomain &d, double timeTotal, bool pc=false){	LC_RNG rng((word32)time(NULL));	SecByteBlock priv(d.EphemeralPrivateKeyLength()), pub(d.EphemeralPublicKeyLength());	clock_t start = clock();	unsigned int i;	double timeTaken;	for (timeTaken=(double)0, i=0; timeTaken < timeTotal; timeTaken = double(clock() - start) / CLOCK_TICKS_PER_SECOND, i++)		d.GenerateEphemeralKeyPair(rng, priv, pub);	OutputResultOperations(name, "Key-Pair Generation", pc, i, timeTaken);	if (!pc && d.GetMaterial().SupportsPrecomputation())	{		d.AccessMaterial().Precompute(16);		BenchMarkKeyGen(name, d, timeTotal, true);	}}void BenchMarkAgreement(const char *name, SimpleKeyAgreementDomain &d, double timeTotal, bool pc=false){	LC_RNG rng((word32)time(NULL));	SecByteBlock priv1(d.PrivateKeyLength()), priv2(d.PrivateKeyLength());	SecByteBlock pub1(d.PublicKeyLength()), pub2(d.PublicKeyLength());	d.GenerateKeyPair(rng, priv1, pub1);	d.GenerateKeyPair(rng, priv2, pub2);	SecByteBlock val(d.AgreedValueLength());	clock_t start = clock();	unsigned int i;	double timeTaken;	for (timeTaken=(double)0, i=0; timeTaken < timeTotal; timeTaken = double(clock() - start) / CLOCK_TICKS_PER_SECOND, i+=2)	{		d.Agree(val, priv1, pub2);		d.Agree(val, priv2, pub1);	}	OutputResultOperations(name, "Key Agreement", pc, i, timeTaken);}void BenchMarkAgreement(const char *name, AuthenticatedKeyAgreementDomain &d, double timeTotal, bool pc=false){	LC_RNG rng((word32)time(NULL));	SecByteBlock spriv1(d.StaticPrivateKeyLength()), spriv2(d.StaticPrivateKeyLength());	SecByteBlock epriv1(d.EphemeralPrivateKeyLength()), epriv2(d.EphemeralPrivateKeyLength());	SecByteBlock spub1(d.StaticPublicKeyLength()), spub2(d.StaticPublicKeyLength());	SecByteBlock epub1(d.EphemeralPublicKeyLength()), epub2(d.EphemeralPublicKeyLength());	d.GenerateStaticKeyPair(rng, spriv1, spub1);	d.GenerateStaticKeyPair(rng, spriv2, spub2);	d.GenerateEphemeralKeyPair(rng, epriv1, epub1);	d.GenerateEphemeralKeyPair(rng, epriv2, epub2);	SecByteBlock val(d.AgreedValueLength());	clock_t start = clock();	unsigned int i;	double timeTaken;	for (timeTaken=(double)0, i=0; timeTaken < timeTotal; timeTaken = double(clock() - start) / CLOCK_TICKS_PER_SECOND, i+=2)	{		d.Agree(val, spriv1, epriv1, spub2, epub2);		d.Agree(val, spriv2, epriv2, spub1, epub1);	}	OutputResultOperations(name, "Key Agreement", pc, i, timeTaken);}//VC60 workaround: compiler bug triggered without the extra dummy parameterstemplate <class SCHEME>void BenchMarkCrypto(const char *filename, const char *name, double timeTotal, SCHEME *x=NULL){	FileSource f(filename, true, new HexDecoder());	typename SCHEME::Decryptor priv(f);	typename SCHEME::Encryptor pub(priv);	BenchMarkEncryption(name, pub, timeTotal);	BenchMarkDecryption(name, priv, pub, timeTotal);}//VC60 workaround: compiler bug triggered without the extra dummy parameterstemplate <class SCHEME>void BenchMarkSignature(const char *filename, const char *name, double timeTotal, SCHEME *x=NULL){	FileSource f(filename, true, new HexDecoder());	typename SCHEME::Signer priv(f);	typename SCHEME::Verifier pub(priv);	BenchMarkSigning(name, priv, timeTotal);	BenchMarkVerification(name, priv, pub, timeTotal);}//VC60 workaround: compiler bug triggered without the extra dummy parameterstemplate <class D>void BenchMarkKeyAgreement(const char *filename, const char *name, double timeTotal, D *x=NULL){	FileSource f(filename, true, new HexDecoder());	D d(f);	BenchMarkKeyGen(name, d, timeTotal);	BenchMarkAgreement(name, d, timeTotal);}extern double g_hertz;void BenchmarkAll2(double t, double hertz){	g_hertz = hertz;	cout << "<TABLE border=1><COLGROUP><COL align=left><COL align=right><COL align=right>" << endl;	cout << "<THEAD><TR><TH>Operation<TH>Milliseconds/Operation" << (g_hertz ? "<TH>Megacycles/Operation" : "") << endl;	cout << "\n<TBODY style=\"background: yellow\">";	BenchMarkCrypto<RSAES<OAEP<SHA> > >("TestData/rsa1024.dat", "RSA 1024", t);	BenchMarkCrypto<LUCES<OAEP<SHA> > >("TestData/luc1024.dat", "LUC 1024", t);	BenchMarkCrypto<DLIES<> >("TestData/dlie1024.dat", "DLIES 1024", t);	BenchMarkCrypto<LUC_IES<> >("TestData/lucc512.dat", "LUCELG 512", t);	cout << "\n<TBODY style=\"background: white\">";	BenchMarkCrypto<RSAES<OAEP<SHA> > >("TestData/rsa2048.dat", "RSA 2048", t);	BenchMarkCrypto<LUCES<OAEP<SHA> > >("TestData/luc2048.dat", "LUC 2048", t);	BenchMarkCrypto<DLIES<> >("TestData/dlie2048.dat", "DLIES 2048", t);	BenchMarkCrypto<LUC_IES<> >("TestData/lucc1024.dat", "LUCELG 1024", t);	cout << "\n<TBODY style=\"background: yellow\">";	BenchMarkSignature<RSASS<PSSR, SHA> >("TestData/rsa1024.dat", "RSA 1024", t);	BenchMarkSignature<RWSS<PSSR, SHA> >("TestData/rw1024.dat", "RW 1024", t);	BenchMarkSignature<LUCSS<PSSR, SHA> >("TestData/luc1024.dat", "LUC 1024", t);	BenchMarkSignature<NR<SHA> >("TestData/nr1024.dat", "NR 1024", t);	BenchMarkSignature<DSA>("TestData/dsa1024.dat", "DSA 1024", t);	BenchMarkSignature<LUC_HMP<SHA> >("TestData/lucs512.dat", "LUC-HMP 512", t);	BenchMarkSignature<ESIGN<SHA> >("TestData/esig1023.dat", "ESIGN 1023", t);	BenchMarkSignature<ESIGN<SHA> >("TestData/esig1536.dat", "ESIGN 1536", t);	cout << "\n<TBODY style=\"background: white\">";	BenchMarkSignature<RSASS<PSSR, SHA> >("TestData/rsa2048.dat", "RSA 2048", t);	BenchMarkSignature<RWSS<PSSR, SHA> >("TestData/rw2048.dat", "RW 2048", t);	BenchMarkSignature<LUCSS<PSSR, SHA> >("TestData/luc2048.dat", "LUC 2048", t);	BenchMarkSignature<NR<SHA> >("TestData/nr2048.dat", "NR 2048", t);	BenchMarkSignature<LUC_HMP<SHA> >("TestData/lucs1024.dat", "LUC-HMP 1024", t);	BenchMarkSignature<ESIGN<SHA> >("TestData/esig2046.dat", "ESIGN 2046", t);	cout << "\n<TBODY style=\"background: yellow\">";	BenchMarkKeyAgreement<XTR_DH>("TestData/xtrdh171.dat", "XTR-DH 171", t);	BenchMarkKeyAgreement<XTR_DH>("TestData/xtrdh342.dat", "XTR-DH 342", t);	BenchMarkKeyAgreement<DH>("TestData/dh1024.dat", "DH 1024", t);	BenchMarkKeyAgreement<DH>("TestData/dh2048.dat", "DH 2048", t);	BenchMarkKeyAgreement<LUC_DH>("TestData/lucd512.dat", "LUCDIF 512", t);	BenchMarkKeyAgreement<LUC_DH>("TestData/lucd1024.dat", "LUCDIF 1024", t);	BenchMarkKeyAgreement<MQV>("TestData/mqv1024.dat", "MQV 1024", t);	BenchMarkKeyAgreement<MQV>("TestData/mqv2048.dat", "MQV 2048", t);	cout << "\n<TBODY style=\"background: white\">";	{		RandomPool rng;		// not seeded		ECIES<ECP>::Decryptor cpriv(rng, ASN1::secp256k1());		ECIES<ECP>::Encryptor cpub(cpriv);		ECDSA<ECP, SHA>::Signer spriv(cpriv);		ECDSA<ECP, SHA>::Verifier spub(spriv);		ECDH<ECP>::Domain ecdhc(ASN1::secp256k1());		ECMQV<ECP>::Domain ecmqvc(ASN1::secp256k1());		BenchMarkEncryption("ECIES over GF(p) 256", cpub, t);		BenchMarkDecryption("ECIES over GF(p) 256", cpriv, cpub, t);		BenchMarkSigning("ECDSA over GF(p) 256", spriv, t);		BenchMarkVerification("ECDSA over GF(p) 256", spriv, spub, t);		BenchMarkKeyGen("ECDHC over GF(p) 256", ecdhc, t);		BenchMarkAgreement("ECDHC over GF(p) 256", ecdhc, t);		BenchMarkKeyGen("ECMQVC over GF(p) 256", ecmqvc, t);		BenchMarkAgreement("ECMQVC over GF(p) 256", ecmqvc, t);	}	cout << "<TBODY style=\"background: yellow\">" << endl;	{		RandomPool rng;		// not seeded		ECIES<EC2N>::Decryptor cpriv(rng, ASN1::sect233r1());		ECIES<EC2N>::Encryptor cpub(cpriv);		ECDSA<EC2N, SHA>::Signer spriv(cpriv);		ECDSA<EC2N, SHA>::Verifier spub(spriv);		ECDH<EC2N>::Domain ecdhc(ASN1::sect233r1());		ECMQV<EC2N>::Domain ecmqvc(ASN1::sect233r1());		BenchMarkEncryption("ECIES over GF(2^n) 233", cpub, t);		BenchMarkDecryption("ECIES over GF(2^n) 233", cpriv, cpub, t);		BenchMarkSigning("ECNR over GF(2^n) 233", spriv, t);		BenchMarkVerification("ECNR over GF(2^n) 233", spriv, spub, t);		BenchMarkKeyGen("ECDHC over GF(2^n) 233", ecdhc, t);		BenchMarkAgreement("ECDHC over GF(2^n) 233", ecdhc, t);		BenchMarkKeyGen("ECMQVC over GF(2^n) 233", ecmqvc, t);		BenchMarkAgreement("ECMQVC over GF(2^n) 233", ecmqvc, t);	}	cout << "</TABLE>" << endl;}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -