eBATS: ECRYPT Benchmarking of Asymmetric Systems
The eBATS
(ECRYPT Benchmarking
of Asymmetric Systems)
project, part of eBACS, measures public-key systems
according to the following criteria:
- Time to generate a key pair (a private key and a corresponding public key).
- Length of the private key.
- Length of the public key.
- Time to generate a secret shared with another user,
given a private key and the other user's public key.
- Length of the shared secret.
- Time to encrypt a message using a public key.
- Length of the encrypted message.
- Time to decrypt an encrypted message using a private key.
- Time to sign a message using a private key.
- Length of the signed message.
- Time to verify a signed message using a public key.
"Time" refers to time on real computers:
time on an ARM Cortex-A8,
time on an Intel Sandy Bridge,
time on an Intel Haswell,
etc.
The point of these cost measures
is that they are directly visible to the cryptographic user.
eBATS times each system on a wide variety of computers,
ensuring direct comparability of all systems
on whichever computers are of interest to the users.
There are separate pages
explaining how to submit
public-key Diffie–Hellman secret-sharing systems,
key-encapsulation mechanisms,
public-key cryptosystems,
and
public-key signature systems
to eBATS.
There are also pages
listing the
public-key Diffie–Hellman secret-sharing systems,
key-encapsulation mechanisms,
public-key cryptosystems,
and
public-key signature systems
already submitted to eBATS.
There are also pages
presenting the latest eBATS measurements for
public-key Diffie–Hellman secret-sharing systems,
key-encapsulation mechanisms,
public-key cryptosystems,
and
public-key signature systems.
This web page supersedes
http://www.ecrypt.eu.org/ebats,
the original eBATS web page.
|