Manuel Pégourié-Gonnard | 63e7eba | 2015-07-28 14:17:48 +0200 | [diff] [blame] | 1 | # mbed TLS benchmark |
| 2 | |
| 3 | This application benchmarks the various cryptographic primitives offered by mbed TLS. |
| 4 | |
| 5 | ## Pre-requisites |
| 6 | |
| 7 | To build and run this example the requirements below are necessary: |
| 8 | |
| 9 | * A computer with the following software installed: |
| 10 | * [CMake](http://www.cmake.org/download/). |
| 11 | * [yotta](https://github.com/ARMmbed/yotta). Please note that **yotta has its own set of dependencies**, listed in the [installation instructions](http://armmbed.github.io/yotta/#installing-on-windows). |
| 12 | * [Python](https://www.python.org/downloads/). |
| 13 | * [ARM GCC toolchain](https://launchpad.net/gcc-arm-embedded). |
| 14 | * A serial terminal emulator (e.g. screen, pySerial, cu). |
| 15 | * An [FRDM-K64F](http://developer.mbed.org/platforms/FRDM-K64F/) development board, or another board supported by mbed OS (in that case you'll have to substitute frdm-k64f-gcc with the appropriate target below). |
| 16 | * A micro-USB cable. |
| 17 | * If your OS is Windows, please follow the installation instructions [for the serial port driver](https://developer.mbed.org/handbook/Windows-serial-configuration). |
| 18 | |
| 19 | ## Getting started |
| 20 | |
| 21 | 1. Connect the FRDM-K64F to the computer with the micro-USB cable, being careful to use the micro-usb port labeled "OpenSDA". |
| 22 | |
| 23 | 2. Navigate to the mbedtls directory supplied with your release and open a terminal. |
| 24 | |
| 25 | 3. Set the yotta target: |
| 26 | |
| 27 | ``` |
| 28 | yotta target frdm-k64f-gcc |
| 29 | ``` |
| 30 | |
Brian Daniels | 3c405ae | 2015-08-18 10:52:57 -0700 | [diff] [blame^] | 31 | 4. Build mbedtls and the examples. This will take a long time if it is the first time: |
Manuel Pégourié-Gonnard | 63e7eba | 2015-07-28 14:17:48 +0200 | [diff] [blame] | 32 | |
| 33 | ``` |
| 34 | $ yt build |
| 35 | ``` |
| 36 | |
Brian Daniels | 3c405ae | 2015-08-18 10:52:57 -0700 | [diff] [blame^] | 37 | 5. Copy `build/frdm-k64f-gcc/test/mbedtls-test-example-benchmark.bin` to your mbed board and wait until the LED next to the USB port stops blinking. |
Manuel Pégourié-Gonnard | 63e7eba | 2015-07-28 14:17:48 +0200 | [diff] [blame] | 38 | |
Brian Daniels | 3c405ae | 2015-08-18 10:52:57 -0700 | [diff] [blame^] | 39 | 6. Start the serial terminal emulator and connect to the virtual serial port presented by FRDM-K64F. For settings, use 115200 baud, 8N1, no flow control. **Warning:** for this example, the baud rate is not the default 9600, it is 115200. |
Manuel Pégourié-Gonnard | 63e7eba | 2015-07-28 14:17:48 +0200 | [diff] [blame] | 40 | |
Brian Daniels | 3c405ae | 2015-08-18 10:52:57 -0700 | [diff] [blame^] | 41 | 7. Press the reset button on the board. |
Manuel Pégourié-Gonnard | 63e7eba | 2015-07-28 14:17:48 +0200 | [diff] [blame] | 42 | |
Brian Daniels | 3c405ae | 2015-08-18 10:52:57 -0700 | [diff] [blame^] | 43 | 8. The output in the terminal window should look like: |
Manuel Pégourié-Gonnard | 63e7eba | 2015-07-28 14:17:48 +0200 | [diff] [blame] | 44 | |
| 45 | ``` |
| 46 | {{timeout;150}} |
| 47 | {{host_test_name;default}} |
| 48 | {{description;mbed TLS benchmark program}} |
| 49 | {{test_id;MBEDTLS_BENCHMARK}} |
| 50 | {{start}} |
| 51 | |
| 52 | |
| 53 | SHA-1 : 3644 Kb/s, 32 cycles/byte |
| 54 | SHA-256 : 1957 Kb/s, 59 cycles/byte |
| 55 | SHA-512 : 587 Kb/s, 200 cycles/byte |
| 56 | AES-CBC-128 : 1359 Kb/s, 86 cycles/byte |
| 57 | AES-CBC-192 : 1183 Kb/s, 99 cycles/byte |
| 58 | AES-CBC-256 : 1048 Kb/s, 111 cycles/byte |
| 59 | AES-GCM-128 : 421 Kb/s, 279 cycles/byte |
| 60 | AES-GCM-192 : 403 Kb/s, 292 cycles/byte |
| 61 | AES-GCM-256 : 385 Kb/s, 305 cycles/byte |
| 62 | AES-CCM-128 : 542 Kb/s, 216 cycles/byte |
| 63 | AES-CCM-192 : 484 Kb/s, 242 cycles/byte |
| 64 | AES-CCM-256 : 437 Kb/s, 268 cycles/byte |
| 65 | CTR_DRBG (NOPR) : 1002 Kb/s, 117 cycles/byte |
| 66 | CTR_DRBG (PR) : 705 Kb/s, 166 cycles/byte |
| 67 | HMAC_DRBG SHA-1 (NOPR) : 228 Kb/s, 517 cycles/byte |
| 68 | HMAC_DRBG SHA-1 (PR) : 210 Kb/s, 561 cycles/byte |
| 69 | HMAC_DRBG SHA-256 (NOPR) : 212 Kb/s, 557 cycles/byte |
| 70 | HMAC_DRBG SHA-256 (PR) : 185 Kb/s, 637 cycles/byte |
| 71 | RSA-2048 : 41 ms/ public |
| 72 | RSA-2048 : 1349 ms/private |
| 73 | RSA-4096 : 134 ms/ public |
| 74 | RSA-4096 : 7149 ms/private |
| 75 | ECDSA-secp384r1 : 640 ms/sign |
| 76 | ECDSA-secp256r1 : 387 ms/sign |
| 77 | ECDSA-secp384r1 : 1233 ms/verify |
| 78 | ECDSA-secp256r1 : 751 ms/verify |
| 79 | ECDHE-secp384r1 : 1191 ms/handshake |
| 80 | ECDHE-secp256r1 : 730 ms/handshake |
| 81 | ECDHE-Curve25519 : 611 ms/handshake |
| 82 | ECDH-secp384r1 : 584 ms/handshake |
| 83 | ECDH-secp256r1 : 365 ms/handshake |
| 84 | ECDH-Curve25519 : 303 ms/handshake |
| 85 | |
| 86 | {{success}} |
| 87 | {{end}} |
| 88 | ``` |