HASH Test - Speedcrypt File Encryption

Speedcrypt
File Encryption
Speedcrypt
Encrypted Files
Go to content
HASH Test...
HASH Test 256 512 Bit, Elapsed Time
This page of the Speedcrypt Project guide shows some tests related to the HASH Functions with their respective times used for the various string derivation processes. The value under examination takes its name from the project, Speedcrypt. Below are the results obtained.

The tests were performed on different PCs, some of them very powerful in terms of hardware, others less so. It was decided to propose the tests carried out on a PCs that is generally used by a very large number of users. Here are the hardware and software characteristics:

  • Processor:             Intel(R) Core(TM) i3 CPU  540  @ 3.07GHz
  • RAM:                    6 GB
  • Operating System: Windows 11 22H2 Home 64 Bit

In the first test performed, BCrypt was also included despite the fixed parameters related to the HASH Size. This could be useful for users who want to make comparisons over the Internet or with the same Speedcrypt.


Note: these tests are purely indicative, go to the page called Security to better understand what parameters to set in your system.
HASH Test 256 Bit
In this test, the string is hashed without additional SALT, except for BCrypt. It is possible to compare these results with various online sites that perform HASH procedures. Now let's see the settings and parameters required to perform this test:

Argon2id
  • Memory Size: 16384
  • Iterations:      4
  • Parallelism:     8
  • SALT Length:  16 Speedcrypt default: 128 Bit
  • HASH Size:     32 Bit

Scrypt
  • Memory Size: 16384
  • Block Size:     8
  • Parallelism:    1
  • SALT Length:  16 Speedcrypt default: 128 Bit
  • HASH Size:     32 Bit

BCrypt                
  • Input Cost 12:     Rounds 4096 with SALT HASH Size Fixed length 24 Bites (192 Bit)

HMACSHA
  • PBKDF2:          Iterations 350000


TEST Result:

Derivate key Argon2id HASH Size 32 without SALT: Speedcrypt
------------------------------------------------------------------------
e3c00cf875c0631a8affb21d0e7339346e5bf5c8177c988652cf5cc52da8445a Time: 00:00.00.929
------------------------------------------------------------------------
Derivate key Scrypt HASH Size 32 without SALT: Speedcrypt
------------------------------------------------------------------------
8a0ad2173b5510f8106d2c38c7b2bd49c8f094860d42ffc45068647c7a1bc337 Time: 00:00.00.234
------------------------------------------------------------------------
Derivate key BCrypt with SALT: Speedcrypt
------------------------------------------------------------------------
$2a$12$XJIFGlCQDCM/dRVsOldMauLvsDW0fnQBBNageDE3wxe68ClVOi1Iu Time: 00:00.00.472
------------------------------------------------------------------------
Derivate key Blake256 without SALT: Speedcrypt
------------------------------------------------------------------------
ff498df0fbac9efaa6ee520530addef3a32a95e7c3918f36502e5bc2bff5e1d2 Time: 00:00.00.001
------------------------------------------------------------------------
Derivate key Skein256 without SALT: Speedcrypt
------------------------------------------------------------------------
a8aa0094c79a7a84af81bb92367caee7872c6c9ee437fabf7cfadbcb7cb39c3a Time: 00:00.00.002
------------------------------------------------------------------------
Derivate key SHA256 without SALT: Speedcrypt
------------------------------------------------------------------------
94c68e984faca63c04976e51354a48c3d4311cee550f5763047b2e752815d48e Time: 00:00.00.000
------------------------------------------------------------------------
Derivate key HMACSHA256 without SALT: Speedcrypt
------------------------------------------------------------------------
3b8929169a5660ee23e6af35b6fd76a451108b301abb00f18b40ab6ab79c1e77 Time: 00:00.02.098
HASH Test 512 Bit
In this second test, BCrypt is excluded for the reasons explained above. Note the difference in string derivation times, especially for HMACSHA. In fact, the iterations of PBKDF2 are set to a value of 350000. Pay attention to this aspect when choosing to derive the Master Key with this function: clearly, the procedure time increases exponentially with the number of iterations, but in return, it offers a very high level of security.


Argon2id
  • Memory Size: 16384
  • Iterations:      4
  • Parallelism:     8
  • SALT Length:  16 Speedcrypt default 128 Bit
  • HASH Size:     64 Bit

Scrypt
  • Memory Size: 16384
  • Block Size:     8
  • Parallelism:    1
  • SALT Length:  16 Speedcrypt default 128 Bit
  • HASH Size:     64 Bit

HMACSHA
  • PBKDF2:           Iterations 350000


TEST Result:

Derivate key Argon2id HASH Size 64 without SALT: Speedcrypt
------------------------------------------------------------------------
c5d5c8e9801e3d11f90ada17b30256aaca2b75987cc76d0d399618bdaa97a8baa77631d2d5f4ccc86547d6d855b4e547ff868700cf0078d3629b58303189acc6 Time: 00:00.00.460
------------------------------------------------------------------------
Derivate key Scrypt HASH Size 64 without SALT: Speedcrypt
------------------------------------------------------------------------
8a0ad2173b5510f8106d2c38c7b2bd49c8f094860d42ffc45068647c7a1bc3376435d1b1b30f1f54b499fda09059960147e035b216c818c3b8428910afdbbb15 Time: 00:00.00.221
------------------------------------------------------------------------
Derivate key Blake512 without SALT: Speedcrypt
------------------------------------------------------------------------
e1be580df65d4050b672e2be3d29ade10527cd75beae807c9be4435b34c76324b5ec30fa5517915bf3a75d0521e7ef2f90719edc589d97009c12f427696e1c8e Time: 00:00.00.010
------------------------------------------------------------------------
Derivate key Skein512 without SALT: Speedcrypt
------------------------------------------------------------------------
19ab3a5ec0e3d03f8936da33457434c1a7d65b4f5139d537b3849b10df6d2e7a1340ed3943aa33836b96e7790a4dc68c2b23f4bedbb501817bbb002c28b8a282 Time: 00:00.00.004
------------------------------------------------------------------------
Derivate key SHA512 without SALT: Speedcrypt
------------------------------------------------------------------------
8a419227b00e2ac528423ba8eb127b35c4601c2958835d443b07680d110444c101840575b61e8dddb8c32df813e7fabf12fedd089eb8ef33c8c86a929dc0d214 Time: 00:00.00.004
------------------------------------------------------------------------
Derivate key HMACSHA512 without SALT: Speedcrypt
------------------------------------------------------------------------
94db656e4ea04d30883edb39b702146dc2bce5835a03b1d0350a16f5d1de1d1ab48e299692037611415f6d036b55a3119627830b83b07d60413d824dd68af03a Time: 00:00.10.949

PGP Keys
Here is a real example of keys generated by the PGP Engine on the Master Key inserted in the Speedcrypt Project. PGP creates two types of keys, a Public Key and a Private Key. If you work with this powerful engine, always be sure to hide the Private Key in a safe place and only insert it into the appropriate folder when using the decryption procedure. The best strategy is to create an external folder inside a mass storage device.

PGP Keys

-----BEGIN PGP PRIVATE KEY BLOCK-----
Version: BCPG C# v
lQHqBGPMJbsBBAC4rchtnewYznVbUxIBAFJ8l29es56pZAQy9WK+tdluyaZJFAib
I6YmoPH6RKjgIn0ztJuQE+4ahmhAPMi7irRORV16dpTJtYIv0Xfw3KkWiIP49lau
j3n+owVDFdUSGIFzpZtbI6tWV7qoHrrRKt4UlwKvO9y6xjIL9h/BW13NSQAFE/8D
AwL8M2+RPymusGC7Z8JM8MfGNad6B7Slv6VcnH/O/jXoMrPsIOhgSRW2QYOyUIQE
n9UkbHv6J++shZ0HCjgyYeeja7H3/SENrG9DYB0E9srjG+HJLUzpXGdk0JTep3/C
e8/YWMfpEDYM6K9fmkHtF8LG1FgZd11VvWdwzcnoORt3Cy2IKO4UZ5fSXKux1Dy4
fJyb/8MDNwoTrLo6BEm54aszM1jA+YTcP2wtbcbunD+8UoaS579zlrxvbLfnaDQY
1mHtu9Fd1ibkRpya57oH13fbZQKxgVES1TsD9TXrnbMJP69ccvEy2IzBJqY2PlVY
OvBed/RS8Pfaz6mlhwz/8mY57v9m4Jd43mCyplNHDAoyxencE8Zt7SqgugY5NE0Q
Lwrg9xfY4pD3qblL1Q1/XV1jjKuYe1fHwykrKHumTNtKVUhjOHvoYq9/WY0Uomd8
fAbfQLOP8Fhhau1NrbQKU3BlZWRjcnlwdIicBBABAgAGBQJjzBerAAoJECMnUFUa
Ae+ztJ4EALfFqG9XHQeWpeNKqRJZITrNvLriRIyWHwiEZ++IPTtoB8N+5rycc1zS
SfK9vcnTlCWlbwnPKLHVruNxo23fu3uVgNPotkGvn9r6iDtkfvCDrPHzSNWixVwR
CkgPqzi/ZVptJqbT3WPaW6JySSx7PVBHxCw1FQ1VOEMJHiOfeVHI
=fzfs
-----END PGP PRIVATE KEY BLOCK-----

-----BEGIN PGP PUBLIC KEY BLOCK-----
Version: BCPG C# v
mIsEY8wluwEEALityG2d7BjOdVtTEgEAUnyXb16znqlkBDL1Yr612W7JpkkUCJsj
piag8fpEqOAifTO0m5AT7hqGaEA8yLuKtE5FXXp2lMm1gi/Rd/DcqRaIg/j2Vq6P
ef6jBUMV1RIYgXOlm1sjq1ZXuqgeutEq3hSXAq873LrGMgv2H8FbXc1JAAUTtApT
cGVlZGNyeXB0iJwEEAECAAYFAmPMF6sACgkQIydQVRoB77O0ngQAt8Wob1cdB5al
40qpElkhOs28uuJEjJYfCIRn74g9O2gHw37mvJxzXNJJ8r29ydOUJaVvCc8osdWu
43Gjbd+7e5WA0+i2Qa+f2vqIO2R+8IOs8fNI1aLFXBEKSA+rOL9lWm0mptPdY9pb
onJJLHs9UEfELDUVDVU4QwkeI595Ucg=
=wwCM
-----END PGP PUBLIC KEY BLOCK-----

The tests presented above are just a few of the tests that can be performed with the Speedcrypt Project. It is possible to make comparisons with sites that offer online password derivation functions and realise how complicated a security system can be, especially if strong passwords are not used. Speedcrypt does everything to help you create secure passwords, but it is up to you to create the strongest possible Master Keys. As proof of this, you can visit the following site or, among many, download software such as Hascat and John the Ripper.
As already mentioned, the tests performed with Speedcrypt are all printable and can be stored in text files, so that comparisons can also be made over time and more easily. It should be noted that it is also possible to perform tests of data encryption and compression, with the results returning the times associated with the completion of each individual procedure.
Back to content