ECHO hash function home design security hard soft compare

This page gives the results of eBASH benchmarks on various plateforms of interest: the legacy Pentiums together with the Atom and the new generation of AES enabled Core i5.
Click on a thumbnail to get the corresponding comparison charts.

legacy benchmarks methodology

The above benchmarks (Pentiums and Atom) were obtained by running a slightly modified version of supercop on our machines. Testing the entire set of hash functions in eBASH would have taken too much time on these legacy CPUs, so that we focused on the 14 semi-finalists SHA-3 candidates. Supercop generates a data.gz file containing all the information you might need (number of cycles taken by each hash function for a given number of bytes between 0 and 4096, best implementation — with associated compilation flags — run on the platform).

We ran different sessions of supercop on each machine (sometimes with a subset of the 14 candidates, when some of them have been patched or updated). The corresponding data.gz files can be downloaded there. (Included are files data_$1_$2.gz where $1 stands for the name of the machine, i.e. atom, p2, p3, or p4, and $2 is the benchmarking session number in chronological order.)

In order to extract the figures presented here, we provide a bash script that fetches information from the data.gz file produced by supercop. (See sample usage of the script here.) This includes:

  • the supercop version and the machine that have generated the file;
  • the SHA-3 candidates that have results in the file;
  • the best implementation for each candidate, the number of cycles per byte for a given input size.