Manuel Pégourié-Gonnard | 63e7eba | 2015-07-28 14:17:48 +0200 | [diff] [blame] | 1 | # mbed TLS benchmark |
| 2 | |
| 3 | This application benchmarks the various cryptographic primitives offered by mbed TLS. |
| 4 | |
| 5 | ## Pre-requisites |
| 6 | |
| 7 | To build and run this example the requirements below are necessary: |
| 8 | |
| 9 | * A computer with the following software installed: |
| 10 | * [CMake](http://www.cmake.org/download/). |
| 11 | * [yotta](https://github.com/ARMmbed/yotta). Please note that **yotta has its own set of dependencies**, listed in the [installation instructions](http://armmbed.github.io/yotta/#installing-on-windows). |
| 12 | * [Python](https://www.python.org/downloads/). |
| 13 | * [ARM GCC toolchain](https://launchpad.net/gcc-arm-embedded). |
| 14 | * A serial terminal emulator (e.g. screen, pySerial, cu). |
| 15 | * An [FRDM-K64F](http://developer.mbed.org/platforms/FRDM-K64F/) development board, or another board supported by mbed OS (in that case you'll have to substitute frdm-k64f-gcc with the appropriate target below). |
| 16 | * A micro-USB cable. |
| 17 | * If your OS is Windows, please follow the installation instructions [for the serial port driver](https://developer.mbed.org/handbook/Windows-serial-configuration). |
| 18 | |
| 19 | ## Getting started |
| 20 | |
| 21 | 1. Connect the FRDM-K64F to the computer with the micro-USB cable, being careful to use the micro-usb port labeled "OpenSDA". |
| 22 | |
| 23 | 2. Navigate to the mbedtls directory supplied with your release and open a terminal. |
| 24 | |
| 25 | 3. Set the yotta target: |
| 26 | |
| 27 | ``` |
| 28 | yotta target frdm-k64f-gcc |
| 29 | ``` |
| 30 | |
| 31 | 4. Check that there are no missing dependencies: |
| 32 | |
| 33 | ``` |
| 34 | $ yt ls |
| 35 | ``` |
| 36 | |
| 37 | If there are, yotta will list them in the terminal. Please install them before proceeding. |
| 38 | |
| 39 | 5. Build mbedtls and the examples. This will take a long time if it is the first time: |
| 40 | |
| 41 | ``` |
| 42 | $ yt build |
| 43 | ``` |
| 44 | |
| 45 | 6. Copy `build/frdm-k64f-gcc/test/mbedtls-test-example-benchmark.bin` to your mbed board and wait until the LED next to the USB port stops blinking. |
| 46 | |
Manuel Pégourié-Gonnard | bd5bbec | 2015-08-06 18:10:17 +0200 | [diff] [blame] | 47 | 7. Start the serial terminal emulator and connect to the virtual serial port presented by FRDM-K64F. For settings, use 115200 baud, 8N1, no flow control. **Warning:** for this example, the baud rate is not the default 9600, it is 115200. |
Manuel Pégourié-Gonnard | 63e7eba | 2015-07-28 14:17:48 +0200 | [diff] [blame] | 48 | |
| 49 | 8. Press the reset button on the board. |
| 50 | |
| 51 | 9. The output in the terminal window should look like: |
| 52 | |
| 53 | ``` |
| 54 | {{timeout;150}} |
| 55 | {{host_test_name;default}} |
| 56 | {{description;mbed TLS benchmark program}} |
| 57 | {{test_id;MBEDTLS_BENCHMARK}} |
| 58 | {{start}} |
| 59 | |
| 60 | |
| 61 | SHA-1 : 3644 Kb/s, 32 cycles/byte |
| 62 | SHA-256 : 1957 Kb/s, 59 cycles/byte |
| 63 | SHA-512 : 587 Kb/s, 200 cycles/byte |
| 64 | AES-CBC-128 : 1359 Kb/s, 86 cycles/byte |
| 65 | AES-CBC-192 : 1183 Kb/s, 99 cycles/byte |
| 66 | AES-CBC-256 : 1048 Kb/s, 111 cycles/byte |
| 67 | AES-GCM-128 : 421 Kb/s, 279 cycles/byte |
| 68 | AES-GCM-192 : 403 Kb/s, 292 cycles/byte |
| 69 | AES-GCM-256 : 385 Kb/s, 305 cycles/byte |
| 70 | AES-CCM-128 : 542 Kb/s, 216 cycles/byte |
| 71 | AES-CCM-192 : 484 Kb/s, 242 cycles/byte |
| 72 | AES-CCM-256 : 437 Kb/s, 268 cycles/byte |
| 73 | CTR_DRBG (NOPR) : 1002 Kb/s, 117 cycles/byte |
| 74 | CTR_DRBG (PR) : 705 Kb/s, 166 cycles/byte |
| 75 | HMAC_DRBG SHA-1 (NOPR) : 228 Kb/s, 517 cycles/byte |
| 76 | HMAC_DRBG SHA-1 (PR) : 210 Kb/s, 561 cycles/byte |
| 77 | HMAC_DRBG SHA-256 (NOPR) : 212 Kb/s, 557 cycles/byte |
| 78 | HMAC_DRBG SHA-256 (PR) : 185 Kb/s, 637 cycles/byte |
| 79 | RSA-2048 : 41 ms/ public |
| 80 | RSA-2048 : 1349 ms/private |
| 81 | RSA-4096 : 134 ms/ public |
| 82 | RSA-4096 : 7149 ms/private |
| 83 | ECDSA-secp384r1 : 640 ms/sign |
| 84 | ECDSA-secp256r1 : 387 ms/sign |
| 85 | ECDSA-secp384r1 : 1233 ms/verify |
| 86 | ECDSA-secp256r1 : 751 ms/verify |
| 87 | ECDHE-secp384r1 : 1191 ms/handshake |
| 88 | ECDHE-secp256r1 : 730 ms/handshake |
| 89 | ECDHE-Curve25519 : 611 ms/handshake |
| 90 | ECDH-secp384r1 : 584 ms/handshake |
| 91 | ECDH-secp256r1 : 365 ms/handshake |
| 92 | ECDH-Curve25519 : 303 ms/handshake |
| 93 | |
| 94 | {{success}} |
| 95 | {{end}} |
| 96 | ``` |