Crypto Benchmark on M467 MCU
ARM Cortex-M4 @ 200 MHz

This benchmark conducted on NuMaker-IoT-M467 will help you in qualifying performance of CycloneCRYPTO (Cryptography library), CycloneSSL (TLS 1.3 & DTLS 1.2 library), CycloneSSH (SSH library with SCP & SFTP protocols), CycloneIPSEC (IPsec/IKEv2 library) and CycloneTCP (TCP/IPv4/IPv6 stack with secure protocols like HTTPS, FTPS, MQTTS, Secure WebSocket, Secure CoAP, Secure Modbus/TCP, SNMPv3...) running on Nuvoton M467 microcontroller.

M467 MCU also includes crypto hardware acceleration. In the following comparison charts, both hardware and software performance are presented in the relevant sections.

Cipher Algorithms

M467 @ 200 MHz

  • Benchmark generated with CycloneCRYPTO 2.4.0
  • Compiled using ARMCC with optimization level 3
AlgorithmCBC Encrypt (Software)CBC Decrypt (Software)CCM Encrypt (Software)CCM Decrypt (Software)GCM Encrypt (Software)GCM Decrypt (Software)
3DES0.524 MB/s0.515 MB/s----
AES-1282.498 MB/s2.533 MB/s1.284 MB/s1.283 MB/s1.293 MB/s1.306 MB/s
AES-1922.196 MB/s2.241 MB/s1.121 MB/s1.119 MB/s1.202 MB/s1.213 MB/s
AES-2561.959 MB/s2.011 MB/s0.994 MB/s0.992 MB/s1.126 MB/s1.134 MB/s
AlgorithmCBC Encrypt (Hardware)CBC Decrypt (Hardware)CCM Encrypt (Hardware)CCM Decrypt (Hardware)GCM Encrypt (Hardware)GCM Decrypt (Hardware)
AES-12817.211 MB/s17.211 MB/s3.324 MB/s3.314 MB/s2.35 MB/s2.347 MB/s
AES-19216.556 MB/s16.528 MB/s3.215 MB/s3.206 MB/s2.336 MB/s2.335 MB/s
AES-25615.923 MB/s15.923 MB/s3.107 MB/s3.098 MB/s2.323 MB/s2.321 MB/s

Hash Algorithms

M467 @ 200 MHz

  • Benchmark generated with CycloneCRYPTO 2.4.0
  • Compiled using ARMCC with optimization level 3
AlgorithmSpeed (Software)Speed (Hardware)
MD513.831 MB/s-
SHA-12.881 MB/s40.322 MB/s
SHA-2242.828 MB/s41.666 MB/s
SHA-2562.827 MB/s41.841 MB/s
SHA-3841.447 MB/s43.103 MB/s
SHA-5121.448 MB/s43.103 MB/s
SHA3-2240.917 MB/s18.832 MB/s
SHA3-2560.866 MB/s18.484 MB/s
SHA3-3840.665 MB/s18.552 MB/s
SHA3-5120.462 MB/s18.656 MB/s

Signature Algorithms

M467 @ 200 MHz

  • Benchmark generated with CycloneCRYPTO 2.4.0
  • Compiled using ARMCC with optimization level 3
AlgorithmSignature Generation (Software)Signature Verification (Software)
RSA (1024 bits)83.4 ms15.5 ms
RSA (2048 bits)431.3 ms57.1 ms
RSA (3072 bits)1220.9 ms122.9 ms
RSA (4096 bits)2637.2 ms217.1 ms
DSA (1024 bits)47.9 ms100.1 ms
DSA (2048 bits)218.1 ms462.8 ms
DSA (3072 bits)467.3 ms998.9 ms
AlgorithmSignature Generation (Hardware)Signature Verification (Hardware)
RSA (1024 bits)4.6 ms0.4 ms
RSA (2048 bits)47.1 ms1.3 ms
RSA (3072 bits)75 ms2.7 ms
RSA (4096 bits)191.5 ms4.6 ms
DSA (1024 bits)11.3 ms27.3 ms
DSA (2048 bits)35.9 ms98.4 ms
DSA (3072 bits)70.8 ms209 ms

EC Signature Algorithms

M467 @ 200 MHz

  • Benchmark generated with CycloneCRYPTO 2.4.0
  • Compiled using ARMCC with optimization level 3
AlgorithmSignature Generation (Software)Signature Verification (Software)
ECDSA (P-256)179.1 ms227.2 ms
ECDSA (P-384)317.3 ms388.6 ms
ECDSA (P-521)342 ms404 ms
EdDSA (Ed25519)40.7 ms80.3 ms
EdDSA (Ed448)177.5 ms352.7 ms
AlgorithmSignature Generation (Hardware)Signature Verification (Hardware)
ECDSA (P-256)13 ms21.8 ms
ECDSA (P-384)25.4 ms40.1 ms
ECDSA (P-521)40.6 ms65.7 ms
EdDSA (Ed25519)24.9 ms49.2 ms
EdDSA (Ed448)81.4 ms162.3 ms

Key Exchange Algorithms

M467 @ 200 MHz

  • Benchmark generated with CycloneCRYPTO 2.4.0
  • Compiled using ARMCC with optimization level 3
AlgorithmPublic Key Generation (Software)Shared Secret Computation (Software)
Diffie-Hellman (1024 bits)164.8 ms164.8 ms
Diffie-Hellman (2048 bits)1129.4 ms1129.6 ms
Diffie-Hellman (3072 bits)3613.5 ms3614.7 ms
Diffie-Hellman (4096 bits)8355.5 ms8356.4 ms
AlgorithmPublic Key Generation (Hardware)Shared Secret Computation (Hardware)
Diffie-Hellman (1024 bits)4.3 ms4.3 ms
Diffie-Hellman (2048 bits)24.3 ms24.3 ms
Diffie-Hellman (3072 bits)71.6 ms71.6 ms
Diffie-Hellman (4096 bits)158.3 ms158.3 ms

EC Key Exchange Algorithms

M467 @ 200 MHz

  • Benchmark generated with CycloneCRYPTO 2.4.0
  • Compiled using ARMCC with optimization level 3
AlgorithmPublic Key Generation (Software)Shared Secret Computation (Software)
ECDH (P-256)175 ms174.5 ms
ECDH (P-384)300.8 ms305.4 ms
ECDH (P-521)335.6 ms334.5 ms
ECDH (X25519)22.7 ms22.7 ms
ECDH (X448)90.7 ms90.7 ms
AlgorithmPublic Key Generation (Hardware)Shared Secret Computation (Hardware)
ECDH (P-256)6.1 ms6.1 ms
ECDH (P-384)12.8 ms12.8 ms
ECDH (P-521)22.6 ms22.6 ms
ECDH (X25519)14 ms14 ms
ECDH (X448)43.7 ms43.8 ms