VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: armeabi; Cortex-A17 (410fc0d1); 2014 Rockchip RK3288; 4 x 1800MHz; tinker, supercop-20240107

[Page version: 20241013 18:38:10]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
239313240734242010
T:
r5nd1pke0d
298299299358301479
T:
r5nd1pke5d
366558368142370728
T:
r5nd3pke5d
369675371148373476
T:
r5nd3pke0d
516147518673522594
T:
r5nd5pke0d
668994672280676574
T:
r5nd5pke5d
133898513448901354299
T:
C:ntruees401ep2
163232916387901645406
T:
C:ntruees439ep1
268041726906622701370
T:
C:ntruees593ep1
425057642632394274338
T:
C:ntruees743ep1
201413682014616820159022
T:
r5n11pke0d
382664963844654338596497
T:
C:ntruees787ep1
389071123892424639092044
T:
r5n13pke0d
493032824958206649822570
T:
lotus128
740736887432890874630998
T:
r5n15pke0d
747751567487018475012792
T:
mcnie4q1281
99842130100087756100873500
T:
mcnie3q1281
103015770103535178103766816
T:
lotus192
128144030128337076128587986
T:
mcnie4q1282
143340994143844470144958074
T:
mcnie3q1282
165766498165896794166131776
T:
mcnie4q1921
185641505185923664186937304
T:
mcnie3q1921
190882532191039228191440008
T:
lotus256
211655516211915928212141690
T:
mcnie4q2561
223031088223281014223639786
T:
mcnie4q1922
251765629252366192253154964
T:
mcnie3q1922
262550982263054616263902544
T:
mcnie3q2561
291437676291767460291998120
T:
mcnie4q2562
429976845430553397431875294
T:
mcnie3q2562
352275112?535868645?759470072?
T:
cargocult2048
435854646?631278638?928727792?
T:
rsa2048
704954041705211570705657477
T:
r5n13pke0smallct
156062775861594039639616446861280
T:
pqrsa15
Cycles to encrypt 59 bytes
25%50%75%system
97968101852103250
T:
rsa2048
101782102073103383
T:
C:ntruees401ep2
98182102498107315
T:
cargocult2048
113781114328115101
T:
C:ntruees439ep1
172277173510174217
T:
C:ntruees593ep1
241688242961244427
T:
C:ntruees743ep1
252580253298254330
T:
C:ntruees787ep1
475905477423479231
T:
r5nd1pke0d
611134613120615379
T:
r5nd1pke5d
619595621458623934
T:
r5nd3pke5d
698482699700702938
T:
mcnie4q1281
730332732805735288
T:
r5nd3pke0d
793376801224815956
T:
lotus128
944776949099952198
T:
mcnie4q1282
100723010104381013808
T:
r5nd5pke0d
107335410762961080230
T:
r5nd5pke5d
115298411559271174924
T:
mcnie4q1921
121894412369821259189
T:
lotus192
135426013603201369456
T:
mcnie4q1922
141610414177741433756
T:
mcnie4q2561
146840014708661481170
T:
mcnie3q1281
165533816587171665950
T:
mcnie4q2562
177734517908971826804
T:
lotus256
180682018082241822936
T:
mcnie3q1282
220844422122142226618
T:
mcnie3q1921
264468026551042665974
T:
mcnie3q1922
301170430207563032812
T:
mcnie3q2561
384049038525323861368
T:
mcnie3q2562
129102481292352212957988
T:
r5n13pke0smallct
192672841929341019314436
T:
r5n11pke0d
343334313434766834384870
T:
r5n13pke0d
601176726027337060974136
T:
r5n15pke0d
726234897286115073100420
T:
pqrsa15
Cycles to decrypt 59 bytes
25%50%75%system
158751158995159256
T:
C:ntruees401ep2
176458176954177439
T:
C:ntruees439ep1
268596269276270102
T:
C:ntruees593ep1
391688392567394238
T:
C:ntruees743ep1
411786412722413300
T:
C:ntruees787ep1
670516672450674328
T:
r5nd1pke0d
829181834043835996
T:
r5nd3pke5d
890640894557898619
T:
r5nd1pke5d
99896010026221012052
T:
lotus128
102530810270361028270
T:
r5nd3pke0d
142731014302941439082
T:
r5nd5pke0d
147707414790561483698
T:
r5nd5pke5d
162196416425791676192
T:
lotus192
188819318979741935816
T:
mcnie4q1281
237563623859042438961
T:
lotus256
250185425186982537702
T:
mcnie3q1281
258806826010222623400
T:
mcnie4q1282
306090930749543094502
T:
mcnie4q1921
314561831651863183826
T:
mcnie3q1282
362674036481763666220
T:
mcnie4q1922
370223237181703732722
T:
mcnie3q1921
374565437600333771776
T:
mcnie4q2561
441631144482844491813
T:
mcnie4q2562
449286845141104539269
T:
mcnie3q1922
487221248863524911158
T:
mcnie3q2561
642756464489466501054
T:
mcnie3q2562
106844271070047410713534
T:
cargocult2048
107299351074634610768702
T:
rsa2048
198342081985741619890600
T:
r5n11pke0d
361854983620062436239682
T:
r5n13pke0d
411547704121885841360044
T:
r5n13pke0smallct
625687046264452463408402
T:
r5n15pke0d
568656968569252130569938648
T:
pqrsa15