Measurements of publickey Diffie–Hellman secretsharing systems on one machine: aarch64; CortexA53 (410fd034); 2018 Broadcom BCM2837B0; 4 x 1400MHz; pi3bplus, supercop20231107
[Page version: 20240720 10:46:06]
eBATS
(ECRYPT Benchmarking
of Asymmetric Systems)
is a project
to measure the performance of publickey systems.
This page presents benchmark results collected in eBATS
for publickey Diffie–Hellman secretsharing systems:
 Time (cycles) to generate a key pair:
a secret key and a corresponding public key.
 Time to compute a shared secret,
given one user's secret key and another user's public key.
 Space (bytes) for a secret key.
 Space for a public key.
 Space for a shared secret.
Each table row lists
the first quartile of many speed measurements,
the median of many speed measurements,
the third quartile of many speed measurements, and
the name of the primitive.
Measurements with large variance are indicated in red with question marks.
The symbol
T:
(starting with supercop20200816)
means that the SUPERCOP database
at the time of benchmarking did not list constant time
as a goal for this implementation.
The symbol
T!!!
means that constant time was listed as a goal for this implementation,
but that the implementation failed TIMECOP.
(TIMECOP failures are not necessarily security issues;
they can sometimes be resolved by, e.g., declaring that a rejectionsampling condition is safe to declassify.)
There is a
separate page
with more information about each Diffie–Hellman system and each implementation.
Designers and implementors
interested in submitting new Diffie–Hellman systems
and new implementations of existing systems
should read the call for submissions.
Implementation notes
Graphs:
(pkcycles,pkbytes)
(scycles,pkbytes)
Cycles to generate a key pair 
25%  50%  75%  system 
464625  465500  469375  T: nistp256 
475750  476500  479125  T: kummer 
493375  496000  500875  T: curve25519 
580625  583750  592375  T: surf127eps 
1029875  1043250  1053250  T: sclaus1024 
3220875  3225625  3234500  T: ed521gs 
3856375  3863625  3868625  T: nist521gs 
5080250  5122125  5152250  T: sclaus2048 
5506750  5511625  5521000  T: claus 

Cycles to compute a shared secret 
25%  50%  75%  system 
476375  477125  479625  T: kummer 
499500  501875  502625  T: curve25519 
581000  583250  588500  T: surf127eps 
1038250  1048375  1061250  T: sclaus1024 
1556250  1565125  1567875  T: nistp256 
3221125  3224500  3231625  T: ed521gs 
3855000  3862000  3867875  T: nist521gs 
5021750  5081125  5086625  T: sclaus2048 
5482125  5487625  5495250  T: claus 

