On the N2 adiantum is an order of magnitude slower than xts (84 vs 427 MiB/s).
But It would likely help a rpi4
Announcement
Collapse
No announcement yet.
Google Details Their New Adiantum Encryption For Low-End Android Devices
Collapse
X
-
Originally posted by ebiggers View Post[*]Adiantum is still 5x faster than AES-256-XTS, and would even still be around 3-4x faster than AES-128-XTS. (Adiantum uses a 256-bit key, so it's more comparable to AES-256-XTS.)[/LIST]AES is simply too slow to be viable for universal, default-on storage encryption on low-end Android devices without the ARMv8 crypto extensions, regardless of the mode of operation chosen. If there was a trivial solution, we would have done it :-)
Leave a comment:
-
Originally posted by sandy8925 View PostHm looks like Google was using AES CBC for full disk encryption...... isn't that significantly slower than AES XTS?
No wonder that ARMv7 Android devices have been struggling and having poor performance since encryption was introduced.- Decryption is actually more performance-critical than encryption. CBC decryption is actually a bit faster than XTS decryption.
- Android is already moving to "file-based encryption" which normally uses XTS (for file contents). Only devices still on "full-disk encryption" use CBC.
- Adiantum is still 5x faster than AES-256-XTS, and would even still be around 3-4x faster than AES-128-XTS. (Adiantum uses a 256-bit key, so it's more comparable to AES-256-XTS.)
Leave a comment:
-
Guest repliedHm looks like Google was using AES CBC for full disk encryption...... isn't that significantly slower than AES XTS?
No wonder that ARMv7 Android devices have been struggling and having poor performance since encryption was introduced.
Leave a comment:
-
Originally posted by mzs.112000 View PostWould this help much with ancient computers and such as well? For example Core 2 Extreme QX9300, still has okay performance as a laptop CPU, but it lacks encryption extensions found in new Intel CPUs.
On an un-related note, I wonder if it would be possible to create a kernel module that would could software emulate newer instruction sets for older CPU's, which would allow new games and such to run, albeit very slowly, on ancient computers(SSE 4.2, not found on Penryn CPU, but it is on Ivy Bridge, if it could be emulated on Penryn, then modern games could run...)
- Likes 2
Leave a comment:
-
Originally posted by mzs.112000 View PostWould this help much with ancient computers and such as well? For example Core 2 Extreme QX9300, still has okay performance as a laptop CPU, but it lacks encryption extensions found in new Intel CPUs.
On an un-related note, I wonder if it would be possible to create a kernel module that would could software emulate newer instruction sets for older CPU's, which would allow new games and such to run, albeit very slowly, on ancient computers(SSE 4.2, not found on Penryn CPU, but it is on Ivy Bridge, if it could be emulated on Penryn, then modern games could run...)
No way that you could emulate a modern CPU instruction set on an old crap CPU fast enough to run anything actually relying on the modern instruction set, where is your logic even. "yeah let's make something exponentially harder so we can run it on old weak hardware, that's going to be great".
- Likes 1
Leave a comment:
-
Originally posted by EarthMind View PostSince I always read that people think Speck has been backdoored by the NSA, isn't it possible to check the source code since it's open source? I can immagine it's not that easy to decipher cryptographic code, but since it's in the kernel and a lot of parties are involved, it shouldn't be impossible?
Actually finding backdoors in math, aka the algorithm itself is an entirely different type of fish than finding backdoors in code.
- Likes 8
Leave a comment:
-
Originally posted by EarthMind View PostSince I always read that people think Speck has been backdoored by the NSA, isn't it possible to check the source code since it's open source? I can immagine it's not that easy to decipher cryptographic code, but since it's in the kernel and a lot of parties are involved, it shouldn't be impossible?
- Likes 5
Leave a comment:
Leave a comment: