ECHO hash function home design security hard soft compare

XEON, 256-bit outputs

XEON, 512-bit outputs


The above graphic displays the timings of the second round candidates of the Nist SHA-3 competition. The benchmarks were done using the ebash framework with the latest implementations packaged therein at the time of the benchmarks.

We also give below which implementation gave the best result that is featured in the above graphic:
hash functionfastest implementation (256-bit)fastest implementation (512-bit)
grøstl/groestl256/asm   /groestl512/asm
simd/simd256/vect128   /simd512/vect128
echo/echo256/pentium/pentium4   /echo512/pentium/pentium4
jhjh256/bitslice_sse2_opt64   /jh512/bitslice_sse2_opt64
blake/blake32/ref   /blake64/sse2
cubehash/cubehash1632/emmintrin4   /cubehash1632/emmintrin4
bmw/bmw256/optc01   /bmw512/optx86sse2
hamsi/hamsi/simd-1   /hamsi/simd-1
luffa/luffa256/sse2_x86asm   /luffa512/sse2_x86asm
keccak/keccak/mmxu1   /keccakc512/mmxu1
shavite-3/shavite3256/no-salt   /shavite3512/Intel-L1Cache
echo-sp/echoSP256/pentium/pentium4   /echoSP512/pentium/pentium4
skein/skein512/opt   /skein512/opt
shabal/shabal512/ref   /shabal512/ref
fugue/fugue256/ANSI_opt    -

All these informations can be extracted from our eBASH packages, generated by supercop when run on our benchmarking machines. Please read this for more details on how you can check these figures.