{-# LANGUAGE PackageImports #-} {-# LANGUAGE OverloadedStrings #-} module Main where import Criterion.Main import "cryptonite" Crypto.Hash import "cryptonite" Crypto.Error import "cryptonite" Crypto.Cipher.DES import "cryptonite" Crypto.Cipher.AES import "cryptonite" Crypto.Cipher.Blowfish import "cryptonite" Crypto.Cipher.Types import qualified "cryptonite" Crypto.Cipher.ChaChaPoly1305 as CP import qualified "cryptonite" Crypto.KDF.PBKDF2 as PBKDF2 import qualified "cryptonite" Crypto.PubKey.ECC.Types as ECC import qualified "cryptonite" Crypto.PubKey.ECC.Prim as ECC import Data.ByteArray (ByteArray) import qualified Data.ByteString as B benchHash = [ ] benchPBKDF2 = [ bgroup "64" [ bench "cryptonite-PBKDF2-100-64" $ nf (pbkdf2 64) 100 , bench "cryptonite-PBKDF2-1000-64" $ nf (pbkdf2 64) 1000 , bench "cryptonite-PBKDF2-10000-64" $ nf (pbkdf2 64) 10000 ] , bgroup "128" [ bench "cryptonite-PBKDF2-100-128" $ nf (pbkdf2 128) 100 , bench "cryptonite-PBKDF2-1000-128" $ nf (pbkdf2 128) 1000 , bench "cryptonite-PBKDF2-10000-128" $ nf (pbkdf2 128) 10000 ] ] where pbkdf2 :: Int -> Int -> B.ByteString pbkdf2 n iter = PBKDF2.generate (PBKDF2.prfHMAC SHA512) (params n iter) mypass mysalt mypass, mysalt :: B.ByteString mypass = "password" mysalt = "salt" params n iter = PBKDF2.Parameters iter n benchBlockCipher = [ bgroup "ECB" benchECB , bgroup "CBC" benchCBC ] where benchECB = [ bench "DES-input=1024" $ nf (run (undefined :: DES) cipherInit key8) input1024 , bench "Blowfish128-input=1024" $ nf (run (undefined :: Blowfish128) cipherInit key16) input1024 , bench "AES128-input=1024" $ nf (run (undefined :: AES128) cipherInit key16) input1024 , bench "AES256-input=1024" $ nf (run (undefined :: AES256) cipherInit key32) input1024 ] where run :: (ByteArray ba, ByteArray key, BlockCipher c) => c -> (key -> CryptoFailable c) -> key -> ba -> ba run witness initF key input = (ecbEncrypt (throwCryptoError (initF key))) input benchCBC = [ bench "DES-input=1024" $ nf (run (undefined :: DES) cipherInit key8 iv8) input1024 , bench "Blowfish128-input=1024" $ nf (run (undefined :: Blowfish128) cipherInit key16 iv8) input1024 , bench "AES128-input=1024" $ nf (run (undefined :: AES128) cipherInit key16 iv16) input1024 , bench "AES256-input=1024" $ nf (run (undefined :: AES256) cipherInit key32 iv16) input1024 ] where run :: (ByteArray ba, ByteArray key, BlockCipher c) => c -> (key -> CryptoFailable c) -> key -> IV c -> ba -> ba run witness initF key iv input = (cbcEncrypt (throwCryptoError (initF key))) iv input key8 = B.replicate 8 0 key16 = B.replicate 16 0 key32 = B.replicate 32 0 input1024 = B.replicate 1024 0 iv8 :: BlockCipher c => IV c iv8 = maybe (error "iv size 8") id $ makeIV key8 iv16 :: BlockCipher c => IV c iv16 = maybe (error "iv size 16") id $ makeIV key16 benchAE = [ bench "ChaChaPoly1305" $ nf (run key32) (input64, input1024) ] where run k (ini, plain) = let iniState = throwCryptoError $ CP.initialize k (throwCryptoError $ CP.nonce12 nonce12) afterAAD = CP.finalizeAAD (CP.appendAAD ini iniState) (out, afterEncrypt) = CP.encrypt plain afterAAD outtag = CP.finalize afterEncrypt in (out, outtag) input64 = B.replicate 64 0 input1024 = B.replicate 1024 0 nonce12 :: B.ByteString nonce12 = B.replicate 12 0 key32 = B.replicate 32 0 benchECC = [ bench "pointAddTwoMuls-baseline" $ nf run_b (n1, p1, n2, p2) , bench "pointAddTwoMuls-optimized" $ nf run_o (n1, p1, n2, p2) ] where run_b (n, p, k, q) = ECC.pointAdd c (ECC.pointMul c n p) (ECC.pointMul c k q) run_o (n, p, k, q) = ECC.pointAddTwoMuls c n p k q c = ECC.getCurveByName ECC.SEC_p256r1 r1 = 7 r2 = 11 p1 = ECC.pointBaseMul c r1 p2 = ECC.pointBaseMul c r2 n1 = 0x2ba9daf2363b2819e69b34a39cf496c2458a9b2a21505ea9e7b7cbca42dc7435 n2 = 0xf054a7f60d10b8c2cf847ee90e9e029f8b0e971b09ca5f55c4d49921a11fadc1 main = defaultMain [ bgroup "hash" benchHash , bgroup "block-cipher" benchBlockCipher , bgroup "AE" benchAE , bgroup "pbkdf2" benchPBKDF2 , bgroup "ECC" benchECC ]