Abstract
SUPERCOP [1] is a benchmarking framework for cryptographic algorithms like ciphers and hash functions. It automatically benchmarks algorithms across several implementations, compilers, compiler options and input data lengths. Since it is freely available for download the results are easily reproducible and benchmark results for virtually every computer that is capable of running SUPERCOP are available. However, since SUPERCOP is a collection of scripts for the Bourne Again Shell and depends on some command line tools from the POSIX standard in it’s current form it can not run on any hardware that does not support POSIX. This is a significant limitation since small devices like mobile phones, PDAs and Smart Cards are important target platforms for cryptographic algorithms. The work presented in this paper extends the SUPERCOP concepts to facilitate benchmarking external targets. A combination of hard- and software allows for cross compilation with SUPERCOP and execution/timing of the generated code on virtually any kind of device large enough to hold the object code of the algorithm benchmarked plus some space for communication routines and a bootloader.
Chapter PDF
Similar content being viewed by others
References
Bernstein, D.J., Lange, T. (eds.): eBACS: ECRYPT Benchmarking of Cryptographic Systems, http://bench.cr.yp.to (accessed November 5, 2009)
NIST: First SHA-3 Candidate Conference, http://csrc.nist.gov/groups/ST/hash/sha-3/Round1/Feb2009/program.html (accessed February 27, 2010)
Bernstein, D.J.: Cache-timing attacks on AES, http://cr.yp.to/antiforgery/cachetiming-20050414.pdf (accessed February 27, 2010)
Ideguchi, K., Owada, T., Yoshida, H.: A Study on RAM Requirements of Various SHA-3 Candidates on Low-cost 8-bit CPUs, http://www.sdl.hitachi.co.jp/crypto/lesamnta/A_Study_on_RAM_Requirements.pdf (accessed February 27, 2010)
Otte, D., et al.: AVR Crypto Lib., http://www.das-labor.org/wiki/AVR-Crypto-Lib/en (accessed February 27, 2010)
Radig, U.: AVR Webserver Software, http://www.ulrichradig.de/ (accessed February 27, 2010)
Pollin: AVR-Net-IO Board, http://www.pollin.de/shop/downloads/D810058B.PDF (accessed February 28, 2010)
Ferguson, N., Lucks, S., Schneier, B., Whiting, D., Bellare, M., Kohno, T., Callas, J., Walker, J.: The Skein Hash Function Family Submission to NIST, Round 2 (2009)
Gligoroski, D., Klima, V., Knapskog, S.J., El-Hadedy, M., Amundsen, J., Mjølsnes, S.F.: Cryptographic Hash Function BLUE MIDNIGHT WISH Submission to NIST, Round 2 (2009)
Bresson, E., Canteaut, A., Chevallier-Mames, B., Clavier, C., Fuhr, T., Gouget, A., Icart, T., Misarsky, J.-F., Naya-Plasencia, M., Paillier, P., Pornin, T., Reinhard, J.-R., Thuillet, C., Videau, M.: - Shabal, a Submission to NIST’s Cryptographic Hash Algorithm Competition Submission to NIST (2008)
Aumasson, J.-P., Henzen, L., Meier, W., Phan, R.C.-W.: SHA-3 proposal BLAKE Submission to NIST (2008)
Bertoni, G., Daemen, J., Peeters, M., Van Assche, G.: Keccak specifications Submission to NIST, Round 2 (2009)
Bernstein, D.J.: CubeHash specification (2.B.1) Submission to NIST, Round 2 (2009)
ARM: Whitepaper about the Cortex-M3, http://www.arm.com/files/pdf/IntroToCortex-M3.pdf (accessed February 28, 2010)
Intel: Presskit on Moore’s law, http://www.intel.com/pressroom/kits/events/moores_law_40th/ (accessed February 28, 2010)
Intel: Pentium 3 datasheet, http://developer.intel.com/design/pentiumiii/datashts/245264.htm (accessed February 28, 2010)
Bernstein, D.J., Lange, T. (eds.): SUPERCOP benchmarking results. See results for computer ’manneke’, http://bench.cr.yp.to/results-hash.html (accessed February 27, 2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Wenzel-Benner, C., Gräf, J. (2010). XBX: eXternal Benchmarking eXtension for the SUPERCOP Crypto Benchmarking Framework. In: Mangard, S., Standaert, FX. (eds) Cryptographic Hardware and Embedded Systems, CHES 2010. CHES 2010. Lecture Notes in Computer Science, vol 6225. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-15031-9_20
Download citation
DOI: https://doi.org/10.1007/978-3-642-15031-9_20
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-15030-2
Online ISBN: 978-3-642-15031-9
eBook Packages: Computer ScienceComputer Science (R0)