com.sun.crypto.provider.GHASH performance fix
Florian Weimer
fweimer at redhat.com
Mon Aug 18 12:32:50 UTC 2014
This change addresses a severe performance regression, first introduced
in JDK 8, triggered by the negotiation of a GCM cipher suite in the TLS
implementation. This regression is a result of the poor performance of
the implementation of the GHASH function.
I first tried to eliminate just the allocations in blockMult while still
retaining the byte arrays. This did not substantially increase
performance in my micro-benchmark. I then replaced the 16-byte arrays
with longs, replaced the inner loops with direct bit fiddling on the
longs, eliminated data-dependent conditionals (which are generally
frowned upon in cryptographic algorithms due to the risk of timing
attacks), and split the main loop in two, one for each half of the hash
state. This is the result:
<https://fweimer.fedorapeople.org/openjdk/ghash-performance/>
Performance is roughly ten times faster. My test download over HTTPS is
no longer CPU-bound, and GHASH hardly shows up in profiles anymore.
(That's why I didn't consider further changes, lookup tables in
particular.) Micro-benchmarking shows roughly a ten-fold increase in
throughput, but this is probably underestimating it because of the high
allocation rate of the old code.
The performance improvement on 32-bit architectures is probably a bit
less, but I suspect that using four ints instead of two longs would
penalize 64-bit architectures.
--
Florian Weimer / Red Hat Product Security
More information about the security-dev
mailing list