-
Notifications
You must be signed in to change notification settings - Fork 11
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
feat (atchops): Faster aes ctr algorithms #705
Comments
@murali-shris - 2 things to be done:
FYI: I did the performance & compatibility tests without any padding for all the algorithms, so the padding didn't impact our results. |
@XavierChanth @gkc
|
@murali-shris better's api is usable without mac, see the benchmark code in at_mono. Better is fully compatible with our current algo. It is not a drop in replacement, we will need to rework code, but all of the code changes should be in private implementation details. The only additional work we will need here is to implement PKCS padding, as the current aes package does padding whereas better does not. |
at_chops and at_auth changes |
Based on previous discussions and benchmarking, we plan to roll this out in two phases:
A note from me:
Benchmarks were done against better_cryptography, webcrypto (boring ssl), cryptography, our C implementation of atchops using ffi (mbedtls) and the current library (encrypt)
The benchmarks were done without PKCS padding, since some algorithms don't include it out of the box.
Better cryptography was consistently the fastest of the stable algorithms, it doesn't support padding, so we will have to take that into consideration when implementing.
The text was updated successfully, but these errors were encountered: