File: hybrid_benchmark_test.go

package info (click to toggle)
golang-github-tink-crypto-tink-go 2.5.0-1
  • links: PTS, VCS
  • area: main
  • in suites:
  • size: 14,996 kB
  • sloc: sh: 876; makefile: 6
file content (125 lines) | stat: -rw-r--r-- 3,383 bytes parent folder | download | duplicates (5)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
// Copyright 2024 Google LLC
//
// Licensed under the Apache License, Version 2.0 (the "License");
// you may not use this file except in compliance with the License.
// You may obtain a copy of the License at
//
//      http://www.apache.org/licenses/LICENSE-2.0
//
// Unless required by applicable law or agreed to in writing, software
// distributed under the License is distributed on an "AS IS" BASIS,
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
// See the License for the specific language governing permissions and
// limitations under the License.

package hybrid_test

import (
	"testing"

	"github.com/tink-crypto/tink-go/v2/hybrid"
	"github.com/tink-crypto/tink-go/v2/keyset"
	"github.com/tink-crypto/tink-go/v2/subtle/random"
	tinkpb "github.com/tink-crypto/tink-go/v2/proto/tink_go_proto"
)

// Benchmarks for Hybrid Encryption algorithms.

const benchmarkPlaintextSize = 1 * 1024
const benchmarkContextInfoSize = 256

var benchmarkTestCases = []struct {
	name     string
	template *tinkpb.KeyTemplate
}{
	{
		name:     "HPKE_X25519_AES128GCM",
		template: hybrid.DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_AES_128_GCM_Key_Template(),
	}, {
		name:     "HPKE_X25519_Chacha20Poly1305",
		template: hybrid.DHKEM_X25519_HKDF_SHA256_HKDF_SHA256_CHACHA20_POLY1305_Key_Template(),
	}, {
		name:     "ECIES_P256_AES128GCM",
		template: hybrid.ECIESHKDFAES128GCMKeyTemplate(),
	}, {
		name:     "ECIES_P256_AES128CTRHMAC",
		template: hybrid.ECIESHKDFAES128CTRHMACSHA256KeyTemplate(),
	}, {
		name:     "ECIES_P384_AES128GCM",
		template: eciesP384AES256GCMKeyTemplate(),
	}, {
		name:     "ECIES_P521_AES128GCM",
		template: eciesP521AES256GCMKeyTemplate(),
	}, {
		name:     "ECIES_P256_AESSIV",
		template: eciesP256AESSIVKeyTemplate(),
	},
}

func BenchmarkEncrypt(b *testing.B) {
	for _, tc := range benchmarkTestCases {
		b.Run(tc.name, func(b *testing.B) {
			b.ReportAllocs()

			privHandle, err := keyset.NewHandle(tc.template)
			if err != nil {
				b.Fatal(err)
			}
			pubHandle, err := privHandle.Public()
			if err != nil {
				b.Fatal(err)
			}
			primitive, err := hybrid.NewHybridEncrypt(pubHandle)
			if err != nil {
				b.Fatal(err)
			}
			plaintext := random.GetRandomBytes(benchmarkPlaintextSize)
			contextInfo := random.GetRandomBytes(benchmarkContextInfoSize)
			b.ResetTimer()
			for i := 0; i < b.N; i++ {
				_, err = primitive.Encrypt(plaintext, contextInfo)
				if err != nil {
					b.Fatal(err)
				}
			}
		})
	}
}

func BenchmarkDecrypt(b *testing.B) {
	for _, tc := range benchmarkTestCases {
		b.Run(tc.name, func(b *testing.B) {
			b.ReportAllocs()

			privHandle, err := keyset.NewHandle(tc.template)
			if err != nil {
				b.Fatal(err)
			}
			pubHandle, err := privHandle.Public()
			if err != nil {
				b.Fatal(err)
			}
			plaintext := random.GetRandomBytes(benchmarkPlaintextSize)
			contextInfo := random.GetRandomBytes(benchmarkContextInfoSize)
			encrypter, err := hybrid.NewHybridEncrypt(pubHandle)
			if err != nil {
				b.Fatal(err)
			}
			ciphertext, err := encrypter.Encrypt(plaintext, contextInfo)
			if err != nil {
				b.Fatal(err)
			}
			primitive, err := hybrid.NewHybridDecrypt(privHandle)
			if err != nil {
				b.Fatal(err)
			}
			b.ResetTimer()
			for i := 0; i < b.N; i++ {
				_, err = primitive.Decrypt(ciphertext, contextInfo)
				if err != nil {
					b.Fatal(err)
				}
			}
		})
	}
}