您的位置:首页 > 其它

各种加密算法的速度对比

2015-11-09 10:32 1701 查看
cpu: Intel Core i7-4712MQ CPU 2.3GHz

memory:8GB

os:win7 64

命令:

cryptotest b

AlgorithmMiB/SecondMicroseconds to

Setup Key and IV
AES/GCM3111.706
AES/CCM1421.094
AES/EAX1431.643
GMAC(AES)7501.707
VMAC(AES)-6431102.703
VMAC(AES)-12816613.150
HMAC(SHA-1)551.584
Two-Track-MAC370.124
CMAC(AES)1930.568
DMAC(AES)1941.866
CRC32205
Adler32354
MD5109
SHA-155
SHA-256225
SHA-512174
SHA-3-22413
SHA-3-25612
SHA-3-38410
SHA-3-5127
Tiger402
Whirlpool118
RIPEMD-16038
RIPEMD-32038
RIPEMD-12849
RIPEMD-25654
Panama-LE16881.765
Panama-BE615.560
Salsa208790.685
Salsa20/1213670.726
Salsa20/819030.725
Sosemanuk13543.011
MARC4937.142
SEAL-3.0-LE58178.711
WAKE-OFB-LE474.077
AES/CTR (128-bit key)5440.798
AES/CTR (192-bit key)4840.802
AES/CTR (256-bit key)4180.868
AES/CBC (128-bit key)1980.684
AES/CBC (192-bit key)1700.691
AES/CBC (256-bit key)1490.742
AES/OFB (128-bit key)1720.784
AES/CFB (128-bit key)1930.927
AES/ECB (128-bit key)6600.316
Camellia/CTR (128-bit key)240.961
Camellia/CTR (256-bit key)201.149
Twofish/CTR1910.193
Serpent/CTR102.399
CAST-256/CTR183.042
RC6/CTR246.154
MARS/CTR157.689
SHACAL-2/CTR (128-bit key)151.665
SHACAL-2/CTR (512-bit key)151.787
DES/CTR169.277
DES-XEX3/CTR149.632
DES-EDE3/CTR829.239
IDEA/CTR151.885
RC5 (r=16)265.145
Blowfish/CTR3060.719
TEA/CTR120.735
XTEA/CTR160.723
CAST-128/CTR231.129
SKIPJACK/CTR108.728
SEED/CTR (1/2 K table)201.046
OperationMilliseconds/Operation
RSA 1024 Encryption0.12
RSA 1024 Decryption1.45
LUC 1024 Encryption0.11
LUC 1024 Decryption2.36
DLIES 1024 Encryption0.64
DLIES 1024 Encryption with precomputation2.51
DLIES 1024 Decryption1.59
LUCELG 512 Encryption0.43
LUCELG 512 Encryption with precomputation0.43
LUCELG 512 Decryption0.83
RSA 2048 Encryption0.21
RSA 2048 Decryption4.81
LUC 2048 Encryption0.21
LUC 2048 Decryption7.56
DLIES 2048 Encryption2.44
DLIES 2048 Encryption with precomputation4.69
DLIES 2048 Decryption4.14
LUCELG 1024 Encryption1.18
LUCELG 1024 Encryption with precomputation1.19
LUCELG 1024 Decryption1.86
RSA 1024 Signature1.43
RSA 1024 Verification0.12
RW 1024 Signature2.51
RW 1024 Verification0.08
LUC 1024 Signature2.39
LUC 1024 Verification0.10
NR 1024 Signature0.35
NR 1024 Signature with precomputation0.76
NR 1024 Verification0.35
NR 1024 Verification with precomputation1.42
DSA 1024 Signature0.37
DSA 1024 Signature with precomputation0.76
DSA 1024 Verification0.37
DSA 1024 Verification with precomputation1.40
LUC-HMP 512 Signature0.43
LUC-HMP 512 Signature with precomputation0.44
LUC-HMP 512 Verification0.47
LUC-HMP 512 Verification with precomputation0.47
ESIGN 1023 Signature0.32
ESIGN 1023 Verification0.11
ESIGN 1536 Signature0.50
ESIGN 1536 Verification0.18
RSA 2048 Signature4.80
RSA 2048 Verification0.21
RW 2048 Signature7.15
RW 2048 Verification0.15
LUC 2048 Signature7.60
LUC 2048 Verification0.21
NR 2048 Signature1.25
NR 2048 Signature with precomputation1.20
NR 2048 Verification1.36
NR 2048 Verification with precomputation2.17
LUC-HMP 1024 Signature1.20
LUC-HMP 1024 Signature with precomputation1.22
LUC-HMP 1024 Verification1.30
LUC-HMP 1024 Verification with precomputation1.29
ESIGN 2046 Signature0.61
ESIGN 2046 Verification0.20
XTR-DH 171 Key-Pair Generation0.70
XTR-DH 171 Key Agreement1.38
XTR-DH 342 Key-Pair Generation1.38
XTR-DH 342 Key Agreement2.74
DH 1024 Key-Pair Generation0.35
DH 1024 Key-Pair Generation with precomputation1.29
DH 1024 Key Agreement1.62
DH 2048 Key-Pair Generation1.28
DH 2048 Key-Pair Generation with precomputation2.41
DH 2048 Key Agreement4.05
LUCDIF 512 Key-Pair Generation0.23
LUCDIF 512 Key-Pair Generation with precomputation0.23
LUCDIF 512 Key Agreement0.80
LUCDIF 1024 Key-Pair Generation0.61
LUCDIF 1024 Key-Pair Generation with precomputation0.62
LUCDIF 1024 Key Agreement1.91
MQV 1024 Key-Pair Generation0.34
MQV 1024 Key-Pair Generation with precomputation0.72
MQV 1024 Key Agreement0.74
MQV 2048 Key-Pair Generation1.21
MQV 2048 Key-Pair Generation with precomputation1.15
MQV 2048 Key Agreement2.52
ECIES over GF(p) 256 Encryption8.21
ECIES over GF(p) 256 Encryption with precomputation5.80
ECIES over GF(p) 256 Decryption5.82
ECDSA over GF(p) 256 Signature4.19
ECDSA over GF(p) 256 Signature with precomputation2.97
ECDSA over GF(p) 256 Verification10.26
ECDSA over GF(p) 256 Verification with precomputation5.26
ECDHC over GF(p) 256 Key-Pair Generation4.13
ECDHC over GF(p) 256 Key-Pair Generation with precomputation2.92
ECDHC over GF(p) 256 Key Agreement4.17
ECMQVC over GF(p) 256 Key-Pair Generation4.12
ECMQVC over GF(p) 256 Key-Pair Generation with precomputation2.90
ECMQVC over GF(p) 256 Key Agreement10.32
ECIES over GF(2^n) 233 Encryption47.32
ECIES over GF(2^n) 233 Encryption with precomputation13.44
ECIES over GF(2^n) 233 Decryption26.71
ECDSA over GF(2^n) 233 Signature23.81
ECDSA over GF(2^n) 233 Signature with precomputation6.82
ECDSA over GF(2^n) 233 Verification29.85
ECDSA over GF(2^n) 233 Verification with precomputation11.59
ECDHC over GF(2^n) 233 Key-Pair Generation23.74
ECDHC over GF(2^n) 233 Key-Pair Generation with precomputation6.76
ECDHC over GF(2^n) 233 Key Agreement23.61
ECMQVC over GF(2^n) 233 Key-Pair Generation23.72
ECMQVC over GF(2^n) 233 Key-Pair Generation with precomputation6.71
ECMQVC over GF(2^n) 233 Key Agreement29.00
Throughput Geometric Average: 302.73
内容来自用户分享和网络整理,不保证内容的准确性,如有侵权内容,可联系管理员处理 点击这里给我发消息
标签: