wycheproof VS XKCP

Compare wycheproof vs XKCP and see what are their differences.

wycheproof

Project Wycheproof tests crypto libraries against known attacks. (by google)

XKCP

eXtended Keccak Code Package (by XKCP)
InfluxDB - Power Real-Time Data Analytics at Scale
Get real-time insights from all types of time series data with InfluxDB. Ingest, query, and analyze billions of data points in real-time with unbounded cardinality.
www.influxdata.com
featured
SaaSHub - Software Alternatives and Reviews
SaaSHub helps you find the best software and product alternatives
www.saashub.com
featured
wycheproof XKCP
12 8
2,587 563
- 0.5%
0.0 8.2
about 4 years ago 12 days ago
Java C
Apache License 2.0 GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

wycheproof

Posts with mentions or reviews of wycheproof. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-10-20.

XKCP

Posts with mentions or reviews of XKCP. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-10-20.
  • SHA-3 Buffer Overflow
    5 projects | news.ycombinator.com | 20 Oct 2022
    > Just another nail in the long overdue C/C++ coffin

    C, f**ing C. By the sake of god. Not C++.

    https://github.com/XKCP/XKCP/commit/fdc6fef075f4e81d6b1bc383...

    Something like that in modern C++ would have been done using span<> and that prevents this kind of out-of-bound access party-time.

  • SHA-3 Buffer Overflow - CVE-2022-37454
    5 projects | /r/crypto | 20 Oct 2022
    This and the commit diff itself tell the tale: https://github.com/XKCP/XKCP/issues/105
  • Linux Kernel RNG is now Blake2 instead of SHA1 and 3x faster
    6 projects | news.ycombinator.com | 30 Dec 2021
    With parameters as specified by SHA3 it's a lot slower than BLAKE3

    Keccak (SHA-3) is actually a good deal faster than BLAKE(1) in hardware. That’s the reason why they chose it: It has acceptable performance in software, and very good performance in hardware.

    KangarooTwelve / MarsupilamiFourteen are Keccak variants with fewer rounds; they should smoke BLAKE2 and probably even BLAKE3 in dedicated hardware. Also, they have tree hashing modes of operation like the later BLAKE developers.

    The BLAKE family is best in situations where you want the best possible software performance; indeed, there are cases where you do not want hardware to outperform software (e.g. key derivation functions) where some Salsa20/ChaCha20/BLAKE variant makes the most sense. The Keccak family is when one already has dedicated hardware instructions (e.g. ARM already has a hardware level Keccak engine; Intel is dragging their feet but it is only a matter of time) or is willing to trade software performance for more hardware performance.

    Keccak code is here: https://github.com/XKCP/XKCP

  • XKCP - Xoodoo and Keccak Code package
    2 projects | /r/crypto | 2 Jan 2021

What are some alternatives?

When comparing wycheproof and XKCP you can also consider the following projects:

ejbca-ce - EJBCA® – Open-source public key infrastructure (PKI) and certificate authority (CA) software.

BLAKE3-specs - The BLAKE3 paper: specifications, analysis, and design rationale

kyberJCE - Pure Java implementation of the Kyber (version 3) post-quantum IND-CCA2 KEM.

autocert - [mirror] Go supplementary cryptography libraries

cryptofuzz - Fuzzing cryptographic libraries. Magic bug printer go brrrr.

curve9767

Monocypher - An easy to use, easy to deploy crypto library

BLAKE3 - the official Rust and C implementations of the BLAKE3 cryptographic hash function

jdk17u - https://wiki.openjdk.org/display/JDKUpdates/JDK+17u

noise_spec - Noise Specification

writeups - CTF writeups from The Flat Network Society

adoptium