[Author Prev][Author Next][Thread Prev][Thread Next][Author Index][Thread Index]

Re: aes performance



You're mistaken here. AES *always* has a block size of 128 bits (it was one of the requirements for the competition to create the AES standard). The algorithm on which AES is based (Rijndael) can support 192 or 256 bits, but this is considered nonstandard today, and does not provide any provable benefit to security. The variable in AES that we usually refer to (as in aes-128) is the key size. Smaller key sizes mean a smaller key space (technically, easier to bruteforce, but still unreasonably hard at present), but they are also dramatically slower. If I recall correctly, aes-192 is almost 50% slower than aes-128 and aes-256 is an additional 15-25% (but I don't have a source for those numbers at this time). AES-128 is still considered secure.

All of that aside, the encryption speed is a non-issue here. Unless you're using a large portion of a gigabit connection, AES will work far faster than your line speed on a modern processor. Additionally, just measuring the speed of that algorithm is very far from the entire story; there are MACs involved and tor has its own things that need to be applied, including layers of encryption. Still, I don't see encryption being a large issue for any but low-powered machines with high bandwidth connections. 

 - John Brooks

On Mon, Feb 23, 2009 at 9:23 AM, Arjan <n6bc23cpcduw@xxxxxxxxxxxxxxxxxxxxxx> wrote:
Olaf Selke wrote:
> hello there,
>
> as I understood tor spends most of its cpu time within openssl library aes crypto.
> Which result of "openssl speed aes" applies to tor? Is it aes-128 cbc 16 bytes?

It would be nice if Tor was using bigger blocks, but I've not looked at
the code yet.


> In this case my old Prestonia P4 Netburst Xeon box's throughput is supposed to
> be roughly about 40 MBit/s as middleman. Correct?
>
> type             16 bytes     64 bytes    256 bytes   1024 bytes   8192 bytes
> aes-128 cbc      84098.99k   119729.69k   138053.97k   142741.16k   144386.04k
> aes-192 cbc      75035.35k   104143.72k   115681.81k   120099.84k   120949.42k
> aes-256 cbc      69559.47k    92221.78k   102006.05k   105361.75k   100274.74k
>
> Strange to say that my desktop Core2 Duo E8400 @home performs only 33% better in
> openssl aes crypto than one of the old P4 Netburst Xeon cores from my tor node.
> For the sake of better performance I'm thinking about replacing my tor node's
> hardware.

If you're going to replace hardware, hardware assisted encryption may be
an option. Recent VIA CPUs like the C7 and the Nano can do that. Their
clock frequency isn't very high, so something else (instead of
encryption) may become the bottleneck.

Resuls for VIA Nano (with 32-bit openssl):

VIA Nano 1.6 GHz with padlock engine
type         16 bytes    64 bytes   256 bytes  1024 bytes  8192 bytes
aes-128-cbc  69796.09k  275407.68k  585574.57k  815018.33k  920136.36k
aes-192-cbc  52670.82k  208539.14k  472485.55k  691277.82k  798340.44k
aes-256-cbc  50984.77k  201934.27k  439964.25k  623764.14k  709612.89k

VIA Nano 1.6 GHz without padlock engine
type         16 bytes    64 bytes   256 bytes  1024 bytes  8192 bytes
aes-128-cbc  41429.86k   55836.29k   60886.87k   62508.03k   62974.63k
aes-192-cbc  35838.02k   47521.62k   51671.72k   52854.10k   53177.00k
aes-256-cbc  33208.77k   41789.16k   45009.83k   45891.24k   46153.73k

Performance for 16-byte blocks is pretty poor, but for bigger blocks
it's much faster.

A VIA C7 running at the same clock frequency should produce similar results.