Lines Matching +full:performance +full:- +full:affecting
1 # SPDX-License-Identifier: GPL-2.0
48 At load time, this module overrides the built-in implementations of
49 these algorithms with its implementations. It also runs self-tests on
171 bool "Disable run-time self tests"
174 Disable run-time self tests that normally take place at
178 bool "Enable extra run-time crypto self tests"
181 Enable extra run-time self tests of registered crypto algorithms,
252 comment "Public-key cryptography"
264 tristate "Diffie-Hellman algorithm"
268 Generic implementation of the Diffie-Hellman algorithm.
282 tristate "EC-RDSA (GOST 34.10) algorithm"
289 Elliptic Curve Russian Digital Signature Algorithm (GOST R 34.10-2012,
290 RFC 7091, ISO/IEC 14888-3:2018) is one of the Russian cryptographic
304 as specified by OSCCA GM/T 0003.1-2012 -- 0003.5-2012.
307 https://tools.ietf.org/html/draft-shen-sm2-ecdsa-02
308 http://www.oscca.gov.cn/sca/xxgk/2010-12/17/content_1002386.shtml
345 tristate "ChaCha20-Poly1305 AEAD support"
351 ChaCha20-Poly1305 AEAD support, RFC7539.
358 tristate "AEGIS-128 AEAD algorithm"
360 select CRYPTO_AES # for AES S-box tables
362 Support for the AEGIS-128 dedicated AEAD algorithm.
365 bool "Support SIMD acceleration for AEGIS-128"
370 tristate "AEGIS-128 AEAD algorithm (x86_64 AESNI+SSE2 implementation)"
375 AESNI+SSE2 implementation of the AEGIS-128 dedicated AEAD algorithm.
434 CBC-CS3 as defined by NIST in Sp800-38A addendum from Oct 2010.
438 See: https://csrc.nist.gov/publications/detail/sp/800-38a/addendum/final
456 narrow block cipher mode for dm-crypt. Use it with cipher
457 specification string aes-lrw-benbi, the key must be 256, 320 or 384.
487 XTS: IEEE1619/D16 narrow block cipher use with aes-xts-plain,
496 Support for key wrapping (NIST SP800-38F / RFC3394) without
527 Adiantum is a tweakable, length-preserving encryption mode
531 an ε-almost-∆-universal hash function, and an invocation of
532 the AES-256 block cipher on a single 16-byte block. On CPUs
534 AES-XTS.
538 bound. Unlike XTS, Adiantum is a true wide-block encryption
548 Encrypted salt-sector initialization vector (ESSIV) is an IV
550 dm-crypt. It uses the hash of the block encryption key as the
562 associated data (AAD) region (which is how dm-crypt uses it.)
579 Cipher-based Message Authentication Code (CMAC) specified by
583 http://csrc.nist.gov/publications/nistpubs/800-38B/SP_800-38B.pdf
590 HMAC: Keyed-Hashing for Message Authentication (RFC2104).
598 XCBC: Keyed-Hashing with encryption algorithm
601 xcbc-mac/xcbc-mac-spec.pdf
609 very high speed on 64-bit architectures.
621 Castagnoli, et al Cyclic Redundancy-Check Algorithm. Used
632 instruction. This option will create 'crc32c-intel' module,
634 gain performance compared with software implementation.
635 Module will be crc32c-intel.
643 CRC32c algorithm implemented using vector polynomial multiply-sum
645 and newer processors for improved performance.
662 CRC-32-IEEE 802.3 cyclic redundancy-check algorithm.
674 instruction. This option will create 'crc32-pclmul' module,
675 which will enable any routine to use the CRC-32-IEEE 802.3 checksum
676 and gain better performance as compared with the table implementation.
692 xxHash non-cryptographic hash algorithm. Extremely fast, working at
705 - blake2b-160
706 - blake2b-256
707 - blake2b-384
708 - blake2b-512
718 optimized for 8-32bit platforms and can produce digests of any size
723 - blake2s-128
724 - blake2s-160
725 - blake2s-224
726 - blake2s-256
752 'crct10dif-pclmul' module, which is faster when computing the
761 multiply-sum (vpmsum) instructions, introduced in POWER8. Enable on
762 POWER8 and newer processors for improved performance.
768 Stress test for CRC32c and CRC-T10DIF algorithms implemented with
778 It is not a general-purpose cryptographic hash function.
788 It is used for the ChaCha20-Poly1305 AEAD, specified in RFC7539 for use
800 It is used for the ChaCha20-Poly1305 AEAD, specified in RFC7539 for use
857 tristate "RIPEMD-128 digest algorithm"
860 RIPEMD-128 (ISO/IEC 10118-3:2004).
862 RIPEMD-128 is a 128-bit cryptographic hash function. It should only
864 RIPEMD-160 should be used.
870 tristate "RIPEMD-160 digest algorithm"
873 RIPEMD-160 (ISO/IEC 10118-3:2004).
875 RIPEMD-160 is a 160-bit cryptographic hash function. It is intended
876 to be used as a secure replacement for the 128-bit hash functions
878 (not to be confused with RIPEMD-128).
881 against RIPEMD-160.
887 tristate "RIPEMD-256 digest algorithm"
890 RIPEMD-256 is an optional extension of RIPEMD-128 with a
892 longer hash-results, without needing a larger security level
893 (than RIPEMD-128).
899 tristate "RIPEMD-320 digest algorithm"
902 RIPEMD-320 is an optional extension of RIPEMD-160 with a
904 longer hash-results, without needing a larger security level
905 (than RIPEMD-160).
914 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
917 tristate "SHA1 digest algorithm (SSSE3/AVX/AVX2/SHA-NI)"
922 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
924 Extensions (AVX/AVX2) or SHA-NI(SHA Extensions New Instructions),
928 tristate "SHA256 digest algorithm (SSSE3/AVX/AVX2/SHA-NI)"
933 SHA-256 secure hash standard (DFIPS 180-2) implemented
936 version 2 (AVX2) instructions, or SHA-NI (SHA Extensions New
945 SHA-512 secure hash standard (DFIPS 180-2) implemented
956 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
965 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2) implemented
973 SHA-1 secure hash standard (FIPS 180-1/DFIPS 180-2).
979 SHA-1 secure hash standard (DFIPS 180-4) implemented
987 SHA256 secure hash standard (DFIPS 180-2).
992 This code also includes SHA-224, a 224 bit hash with 112 bits
1001 SHA224 and SHA256 secure hash standard (DFIPS 180-2)
1010 SHA-256 secure hash standard (DFIPS 180-2) implemented
1019 SHA-256 secure hash standard (DFIPS 180-2) implemented
1026 SHA512 secure hash standard (DFIPS 180-2).
1031 This code also includes SHA-384, a 384 bit hash with 192 bits
1040 SHA-512 secure hash standard (DFIPS 180-2) implemented
1049 SHA-512 secure hash standard (DFIPS 180-2) implemented
1056 SHA-3 secure hash standard (DFIPS 202). It's based on
1066 SM3 secure hash function as defined by OSCCA GM/T 0004-2012 SM3).
1071 https://datatracker.ietf.org/doc/html/draft-shen-sm3-hash
1077 Streebog Hash Function (GOST R 34.11-2012, RFC 6986) is one of the Russian
1089 Tiger hash algorithm 192, 160 and 128-bit hashes
1091 Tiger is a hash function optimized for 64-bit processors while
1092 still having decent performance on 32-bit processors.
1102 Whirlpool hash algorithm 512, 384 and 256-bit hashes
1104 Whirlpool-512 is part of the NESSIE cryptographic primitives.
1105 Whirlpool will be part of the ISO/IEC 10118-3:2003(E) standard
1111 tristate "GHASH hash function (CLMUL-NI accelerated)"
1115 This is the x86_64 CLMUL-NI accelerated implementation of
1125 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1130 environments regardless of its use in feedback or non-feedback
1133 suited for restricted-space environments, in which it also
1134 demonstrates excellent performance. Rijndael's operations are
1147 data dependent latencies as much as possible without affecting
1148 performance too much. It is intended for use by the generic CCM
1151 with a more dramatic performance hit)
1154 8 for decryption), this implementation only uses just two S-boxes of
1161 tristate "AES cipher algorithms (AES-NI)"
1170 Use Intel AES-NI instructions for AES algorithm.
1172 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1177 environments regardless of its use in feedback or non-feedback
1180 suited for restricted-space environments, in which it also
1181 demonstrates excellent performance. Rijndael's operations are
1200 AES cipher algorithms (FIPS-197). AES uses the Rijndael
1205 environments regardless of its use in feedback or non-feedback
1208 suited for restricted-space environments, in which it also
1209 demonstrates excellent performance. Rijndael's operations are
1225 AES cipher algorithms (FIPS-197). Additionally the acceleration
1232 tables or 256 bytes S-boxes.
1258 bits in length. This algorithm is required for driver-based
1333 tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX)"
1342 Camellia cipher algorithm module (x86_64/AES-NI/AVX).
1353 tristate "Camellia cipher algorithm (x86_64/AES-NI/AVX2)"
1358 Camellia cipher algorithm module (x86_64/AES-NI/AVX2).
1392 tristate "CAST5 (CAST-128) cipher algorithm"
1396 The CAST5 encryption algorithm (synonymous with CAST-128) is
1400 tristate "CAST5 (CAST-128) cipher algorithm (x86_64/AVX)"
1407 The CAST5 encryption algorithm (synonymous with CAST-128) is
1414 tristate "CAST6 (CAST-256) cipher algorithm"
1418 The CAST6 encryption algorithm (synonymous with CAST-256) is
1422 tristate "CAST6 (CAST-256) cipher algorithm (x86_64/AVX)"
1431 The CAST6 encryption algorithm (synonymous with CAST-256) is
1442 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3).
1451 DES cipher algorithm (FIPS 46-2), and Triple DES EDE (FIPS 46-3),
1455 tristate "Triple DES EDE cipher algorithm (x86-64)"
1460 Triple DES EDE (FIPS 46-3) algorithm.
1463 algorithm that is optimized for x86-64 processors. Two versions of
1482 an algorithm optimized for 64-bit processors with good performance
1483 on 32-bit processors. Khazad uses an 128 bit key size.
1507 ChaCha20 is a 256-bit high-speed stream cipher designed by Daniel J.
1510 <https://cr.yp.to/chacha/chacha-20080128.pdf>
1516 <https://cr.yp.to/snuffle/xsalsa-20081128.pdf>
1519 reduced security margin but increased performance. It can be needed
1520 in some performance-sensitive scenarios.
1523 tristate "ChaCha stream cipher algorithms (x86_64/SSSE3/AVX2/AVX-512VL)"
1529 SSSE3, AVX2, and AVX-512VL optimized implementations of the ChaCha20,
1545 SEED is a 128-bit symmetric key block cipher that has been
1644 SM4 cipher algorithms (OSCCA GB/T 32907-2016).
1646 SM4 (GBT.32907-2016) is a cryptographic standard issued by the
1653 (GB.15629.11-2003).
1655 The latest SM4 standard (GBT.32907-2016) was proposed by OSCCA and
1680 Xtendend Encryption Tiny Algorithm is a mis-implementation
1737 tristate "Twofish cipher algorithm (x86_64, 3-way parallel)"
1744 Twofish cipher algorithm (x86_64, 3-way parallel).
1752 blocks parallel, utilizing resources of out-of-order CPUs better.
1852 tristate "NIST SP800-90A DRBG"
1854 NIST SP800-90A compliant DRBG. In the following submenu, one or
1869 Enable the Hash DRBG variant as defined in NIST SP800-90A.
1876 Enable the CTR DRBG variant as defined in NIST SP800-90A.
1887 tristate "Jitterentropy Non-Deterministic Random Number Generator"
1900 tristate "User-space interface for hash algorithms"
1905 This option enables the user-spaces interface for hash
1909 tristate "User-space interface for symmetric key cipher algorithms"
1914 This option enables the user-spaces interface for symmetric
1918 tristate "User-space interface for random number generator algorithms"
1923 This option enables the user-spaces interface for random
1930 This option enables extra API for CAVP testing via the user-space
1936 tristate "User-space interface for AEAD cipher algorithms"
1943 This option enables the user-spaces interface for AEAD
1956 bool "Crypto usage statistics for User-space"
1961 - encrypt/decrypt size and numbers of symmeric operations
1962 - compress/decompress size and numbers of compress operations
1963 - size and numbers of hash operations
1964 - encrypt/decrypt/sign/verify numbers for asymmetric operations
1965 - generate/seed numbers for rng operations