VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information: Introduction eBASH eBASC eBATS SUPERCOP XBX Computers
How to submit new software: Hash functions Stream ciphers DH functions Public-key encryption Public-key signatures
List of primitives measured: SHA-3 finalists All hash functions Stream ciphers DH functions Public-key encryption Public-key signatures
Measurements indexed by machine: SHA-3 finalists All hash functions Stream ciphers DH functions Public-key encryption Public-key signatures

Introduction

Users of cryptography have a choice of public-key signature systems, including RSA, DSA, ECDSA, and many more. Exactly how fast are these systems? How do the speeds vary among Core 2, Athlon 64, PowerPC, etc.? How much network bandwidth do the systems consume? The same questions arise for many other cryptographic operations, including public-key encryption, Diffie–Hellman public-key secret sharing, secret-key encryption, and hash functions.

eBACS (ECRYPT Benchmarking of Cryptographic Systems) aims to answer these questions. eBACS unifies and integrates

The eBACS/eBATS/eBASC/eBASH mailing list is named after eBATS, the first of these projects. To join the mailing list, send an empty message to ebats-subscribe at list.cr.yp.to.

eBACS is organized by ECRYPT II, a Network of Excellence within the European Commission's Seventh Framework Programme (FP7), contract number ICT-2007-216676. eBACS is an activity of ECRYPT's Virtual Application and Implementation Research Lab (VAMPIRE). ECRYPT II began 1 August 2008. Some components of eBACS began earlier, as part of ECRYPT, a Network of Excellence within the European Commission's Sixth Framework Programme (FP6), contract number IST-2002-507932. Many further improvements to eBACS have been funded by grant 60NANB10D004 from the United States National Institute of Standards and Technology (NIST). eBACS also incorporates data from the XBX project by Christian Wenzel-Benner and Jens Gräf.

If you use eBACS information in a paper then you should cite the web pages as follows:

Daniel J. Bernstein and Tanja Lange (editors). eBACS: ECRYPT Benchmarking of Cryptographic Systems. http://bench.cr.yp.to, accessed 7 March 2015.
Replace 7 March 2015 by your download date.

History

ECRYPT's STVL lab distributed a new benchmarking suite as part of eSTREAM, a multi-year project that has identified several promising new stream ciphers. The benchmarking suite was written by Christophe De Cannière. The benchmarking suite was made public, allowing third parties to collect and verify performance data for more than thirty stream ciphers submitted to eSTREAM.

STVL's successful benchmarking efforts inspired VAMPIRE's eBATS, a competition for the fastest public-key software. VAMPIRE developed a new benchmarking suite, BATMAN (Benchmarking of Asymmetric Tools on Multiple Architectures, Non-Interactively), to collect measurements of BATs (Benchmarkable Asymmetric Tools) on a large number of computers. The eBATS measurements and comparisons began at the end of 2006.

VAMPIRE subsequently initiated the eBASC and eBASH projects. eSTREAM finished in April 2008 but VAMPIRE will continue to accept new stream ciphers for benchmarking as part of eBASC. VAMPIRE is also providing hash-function performance data to NIST as part of eBASH.

VAMPIRE developed a new unified benchmarking suite, SUPERCOP, that benchmarks hash functions, secret-key stream ciphers, public-key encryption systems, public-key signature systems, and public-key secret-sharing systems. Unified measurements were collected on fifty computers in July 2008.

Version

This is version 2013.03.06 of the index.html web page. This web page is in the public domain.