Hardware Acceleration¶
Botan provides built-in support for hardware acceleration of certain algorithms on certain platforms. These alternate implementations use special CPU instructions that are not available on all platforms and either speed up the algorithm or improve security in terms of side channel resistance.
A “base” software implementation is always provided. For example, for the AES-128 block cipher three implementations are available. All of the AES implementations are immune to common cache/timing based side channels.
If AES hardware support is available (AES-NI, POWER8, Aarch64) use that
If 128-bit SIMD with byte shuffles are available (SSSE3, NEON, or Altivec), use the vperm technique published by Mike Hamburg at CHES 2009
If no hardware or SIMD support, fall back to a constant time bitsliced implementation
The following sections list the platforms and algorithms for which hardware acceleration is available. If the CPU specific optimizations are available at runtime, they are automatically used if enabled in the build. If not, the base implementation is used.
It is possible to disable CPU-specific optimizations at runtime by setting the
environment variable BOTAN_CLEAR_CPUID
. For example
BOTAN_CLEAR_CPUID=avx2
will disable use of any AVX2 instructions.
x86¶
On x86-64 and x86-32 platforms, the following CPU specific optimizations are available:
Algorithm |
Extension |
Module |
Added in |
---|---|---|---|
AES |
VAES-AVX2 AES-NI SSSE3 |
aes_vaes aes_ni aes_vperm |
3.6.0 1.9.3 1.9.10 |
AES-GCM |
CLMUL SSSE3 |
ghash_cpu ghash_vperm |
1.11.6 1.9.10 |
Argon2 |
AVX2 SSSE3 |
argon2_avx2 argon2_ssse3 |
3.0.0 2.19.2 |
ChaCha |
AVX512 (x86-64 only) AVX2 SSSE3 |
chacha_avx512 chacha_avx2 chacha_simd32 |
3.1.0 2.8.0 1.11.32 |
IDEA |
SSE2 |
idea_sse2 |
1.9.4 |
KMAC |
BMI2 |
keccak_perm_bmi2 |
3.2.0 |
NOEKEON |
SSSE3 |
noekeon_simd |
1.9.4 |
RDRAND |
RDRAND |
processor_rng |
1.11.31 |
RDSEED |
RDSEED |
rdseed |
1.11.36 |
Serpent |
AVX512 (x86-64 only) AVX2 SSSE3 |
serpent_avx512 serpent_avx2 serpent_simd |
3.1.0 2.8.0 1.9.0 |
SHACAL2 |
Intel SHA Extensions AVX2 |
shacal2_x86 shacal2_avx2 |
2.3.0 2.13.0 |
SHAKE |
BMI2 |
keccak_perm_bmi2 |
2.13.0 |
SHA-1 |
Intel SHA Extensions SSSE3 |
sha1_x86 sha1_simd |
2.2.0 1.7.12 |
SHA-256 |
Intel SHA Extensions SSSE3 AVX2 + BMI2 |
sha2_32_x86 sha2_32_simd sha2_32_avx2 |
2.2.0 3.8.0 3.8.0 |
SHA-512 |
Intel SHA Extensions AVX2 + BMI2 AVX-512 + BMI2 |
sha2_64_x86 sha2_64_avx2 sha2_64_avx512 |
3.8.0 3.8.0 3.8.0 |
SHA-3 |
BMI2 |
keccak_perm_bmi2 |
2.10.0 |
SM4 |
AVX2 + GFNI |
sm4_gfni |
3.6.0 |
ZFEC |
SSSE3 |
zfec_vperm |
3.0.0 |
ARM¶
On arm64 and arm32 platforms, the following CPU specific optimizations are available:
Algorithm |
Extension |
Module |
Added in |
---|---|---|---|
AES |
NEON |
aes_armv8 |
1.9.3 |
AES-GCM |
PMULL (arm64 only) |
ghash_cpu |
2.3.0 |
ChaCha |
NEON |
chacha_simd32 |
2.8.0 |
NOEKEON |
NEON |
noekeon_simd |
1.9.4 |
Serpent |
NEON |
serpent_simd |
1.9.2 |
SHACAL2 |
NEON ARMv8 Cryptography Extensions (arm64 only) |
shacal2_simd shacal2_armv8 |
2.3.0 2.13.0 |
SHA-1 |
ARMv8 Cryptography Extensions (arm64 only) NEON |
sha1_armv8 sha1_simd |
2.2.0 3.8.0 |
SHA-256 |
ARMv8 Cryptography Extensions (arm64 only) NEON |
sha2_32_armv8 sha2_32_simd |
2.2.0 3.8.0 |
SHA-384 |
ARMv8 Cryptography Extensions (arm64 only) |
sha2_64_armv8 |
3.3.0 |
SHA-512 |
ARMv8 Cryptography Extensions (arm64 only) |
sha2_64_armv8 |
3.3.0 |
SM4 |
ARMv8 Cryptography Extensions (arm64 only) |
sm4_armv8 |
2.8.0 |
ZFEC |
NEON |
zfec_vperm |
3.0.0 |
PowerPC¶
On ppc64 and ppc32 platforms, the following CPU specific optimizations are available:
Algorithm |
Extension |
Module |
Added in |
---|---|---|---|
AES |
POWER8/POWER9 AltiVec |
aes_power8 aes_vperm |
2.14.0 2.12.0 |
ChaCha |
AltiVec |
chacha_simd32 |
2.8.0 |
DARN |
POWER9 |
processor_rng |
2.15.0 |
Serpent |
AltiVec |
serpent_simd |
1.9.2 |
SHACAL2 |
AltiVec |
shacal2_simd |
2.3.0 |
NOEKEON |
AltiVec |
noekeon_simd |
1.9.4 |
Loongarch64¶
On loongarch64, the LSX extensions are used.
Note
Loongarch64 apparently supports a “crypto” extension, for which hwcaps exist for Linux, and there are shipping processors which do support these extensions. However no documentation has been so far located. If you are aware of any such documentation please do contact the maintainers.
Algorithm |
Extension |
Module |
Added in |
---|---|---|---|
AES |
LSX |
aes_vperm |
3.8.0 |
ChaCha |
LSX |
chacha_simd32 |
3.8.0 |
Serpent |
LSX |
serpent_simd |
3.8.0 |
SHA-1 |
LSX |
sha1_simd |
3.8.0 |
SHACAL2 |
LSX |
shacal2_simd |
3.8.0 |
NOEKEON |
LSX |
noekeon_simd |
3.8.0 |
ZFEC |
LSX |
zfec_vperm |
3.8.0 |
Configuring Acceleration¶
Hardware acceleration can be disabled at during configuring the build
by passing certain --disable-*
options to configure.py
.
This will cause the base software implementation to be used instead
of the hardware accelerated one. The following options are currently supported:
--disable-sse2
disable SSE2 intrinsics
--disable-ssse3
disable SSSE3 intrinsics
--disable-sse4.1
disable SSE4.1 intrinsics
--disable-sse4.2
disable SSE4.2 intrinsics
--disable-avx2
disable AVX2 intrinsics
--disable-bmi2
disable BMI2 intrinsics
--disable-rdrand
disable RDRAND intrinsics
--disable-rdseed
disable RDSEED intrinsics
--disable-aes-ni
disable AES-NI intrinsics
--disable-sha-ni
disable SHA-NI intrinsics
--disable-altivec
disable AltiVec intrinsics
--disable-neon
disable NEON intrinsics
--disable-armv8crypto
disable ARMv8 Crypto intrinsics
--disable-powercrypto
disable POWER Crypto intrinsics
Additionally, --disable-modules=MODS
can be used to remove a certain module,
if desirable.
Last but not least, the BOTAN_CLEAR_CPUID
environment variable
can be set to a non-empty value at runtime to cause Botan to clear the CPUID bits for the CPU
extensions it uses.