Skip to content
Snippets Groups Projects
cryptobench_test.go 6.27 KiB
Newer Older
////////////////////////////////////////////////////////////////////////////////
// Copyright © 2022 xx foundation                                             //
//                                                                            //
// Use of this source code is governed by a license that can be found in the  //
// LICENSE file.                                                              //
////////////////////////////////////////////////////////////////////////////////

package main
	"crypto/rand"
	"strconv"

	"gitlab.com/elixxir/crypto/cyclic"
	dh "gitlab.com/elixxir/crypto/diffieHellman"
	"gitlab.com/elixxir/crypto/rsa"
	"gitlab.com/xx_network/crypto/csprng"
	"gitlab.com/xx_network/crypto/large"
)

// //tests Session keys are generated correctly
// func TestGenerateSessionKey(t *testing.T) {
// 	const numTests = 50

// 	primeString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
// 	p := large.NewInt(1)
// 	p.SetString(primeString, 16)
// 	g := large.NewInt(2)
// 	grp := cyclic.NewGroup(p, g)

// 	rng := csprng.NewSystemRNG()

// 	for i := 0; i < numTests; i++ {
// 		//create session key
// 		privKey := dh.GeneratePrivateKey(dh.DefaultPrivateKeyLength, grp, rng)
// 		publicKey := dh.GeneratePublicKey(privKey, grp)
// 		session := dh.GenerateSessionKey(privKey, publicKey, grp)

// 		//create public key manually
// 		sessionExpected := grp.NewInt(1)
// 		grp.Exp(publicKey, privKey, sessionExpected)

// 		if session.Cmp(sessionExpected) != 0 {
// 			t.Errorf("Session key generated on attempt %v incorrect;"+
// 				"\n\tExpected: %s \n\tReceived: %s \n\tPrivate key: %s", i,
// 				sessionExpected.TextVerbose(16, 0),
// 				session.TextVerbose(16, 0),
// 				privKey.TextVerbose(16, 0))
// 		}
// 	}
// }

// Benchmarks session key creation
func BenchmarkCreateDHSessionKey(b *testing.B) {
	// primeString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
	primeString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
	p := large.NewInt(1)
	p.SetString(primeString, 16)
	g := large.NewInt(2)
	grp := cyclic.NewGroup(p, g)

	pubKeys := make([]*cyclic.Int, b.N)
	privKeys := make([]*cyclic.Int, b.N)

	rng := csprng.NewSystemRNG()

	for i := 0; i < b.N; i++ {
		// Creation of two different DH Key Pairs with valid parameters
		privKeys[i] = dh.GeneratePrivateKey(dh.DefaultPrivateKeyLength, grp, rng)
		tmpPrivKey := dh.GeneratePrivateKey(dh.DefaultPrivateKeyLength, grp, rng)
		pubKeys[i] = dh.GeneratePublicKey(tmpPrivKey, grp)
	}

	b.ResetTimer()
	for i := 0; i < b.N; i++ {
		dh.GenerateSessionKey(privKeys[i], pubKeys[i], grp)
	}
}

func BenchmarkRSASigCreate(b *testing.B) {
	// Generate keys
	sLocal := rsa.GetScheme()
	rng := rand.Reader

	privKey, err := sLocal.GenerateDefault(rng)
	if err != nil {
		b.Errorf("GenerateDefault: %v", err)
	}

	// pubKey := privKey.Public()

	// Construct signing options
	opts := rsa.NewDefaultPSSOptions()
	hashFunc := opts.HashFunc()

	for i := 0; i < b.N; i++ {
		// Create hash
		h := hashFunc.New()
		h.Write([]byte(strconv.Itoa(i) + "test12345"))
		hashed := h.Sum(nil)

		// Construct signature
		_, err := privKey.SignPSS(rng, hashFunc, hashed, opts)
		if err != nil {
			b.Fatalf("SignPSS error: %+v", err)
		}
	}
}

func BenchmarkRSASigVerify(b *testing.B) {
	// Generate keys
	sLocal := rsa.GetScheme()
	rng := rand.Reader

	privKey, err := sLocal.GenerateDefault(rng)
	if err != nil {
		b.Errorf("GenerateDefault: %v", err)
	}

	pubKey := privKey.Public()

	// Construct signing options
	opts := rsa.NewDefaultPSSOptions()
	hashFunc := opts.HashFunc()
	// Create hash
	h := hashFunc.New()
	h.Write([]byte(strconv.Itoa(0) + "test12345"))
	hashed := h.Sum(nil)

	// Construct signature
	signed, err := privKey.SignPSS(rng, hashFunc, hashed, opts)
	if err != nil {
		b.Fatalf("SignPSS error: %+v", err)
	}

	for i := 0; i < b.N; i++ {
		// Verify signature
		err = pubKey.VerifyPSS(hashFunc, hashed, signed, opts)
		if err != nil {
			b.Fatalf("VerifyPSS error: %+v", err)
		}
	}
}