Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Cipher suite ordering: AES vs Chacha20 #509

Closed
Matthias247 opened this issue Feb 14, 2021 · 0 comments
Closed

Cipher suite ordering: AES vs Chacha20 #509

Matthias247 opened this issue Feb 14, 2021 · 0 comments

Comments

@Matthias247
Copy link

After some testing with quinn we noticed that rustls most highly preferrenced cipher suite TLS13_CHACHA20_POLY1305_SHA256 is quite a bit slower than TLS13_AES_128_GCM_SHA256 and TLS13_AES_256_GCM_SHA384 on typical desktop and server hardware due to hardware acceleration for AES.

Where a quic loopback transfer with TLS13_CHACHA20_POLY1305_SHA256 maxed out at 350MB/s, it reached 520MB/s using TLS13_AES_128_GCM_SHA256 (+50%), and about 500MB/s using TLS13_AES_256_GCM_SHA384.

Can the cipher suite list in ALL_CIPHERSUITES be reordered to prefer AES cipher suites?

I feel like there will be quite a lot of people running this with default config, and might not detect that they are not reaching peak performance and efficiency.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

No branches or pull requests

2 participants