Measurements of publickey Diffie–Hellman secretsharing systems on one machine: aarch64; CortexA72 (410fd083); 2019 Broadcom BCM2711; 4 x 1500MHz; pi4b, supercop20241022
[Page version: 20241107 11:34:53]
eBATS
(ECRYPT Benchmarking
of Asymmetric Systems)
is a project
to measure the performance of publickey systems.
This page presents benchmark results collected in eBATS
for publickey Diffie–Hellman secretsharing systems:
 Time (cycles) to generate a key pair:
a secret key and a corresponding public key.
 Time to compute a shared secret,
given one user's secret key and another user's public key.
 Space (bytes) for a secret key.
 Space for a public key.
 Space for a shared secret.
Each table row lists
the first quartile of many speed measurements,
the median of many speed measurements,
the third quartile of many speed measurements, and
the name of the primitive.
Measurements with large variance are indicated in red with question marks.
The symbol
T:
(starting with supercop20200816)
means that the SUPERCOP database
at the time of benchmarking did not list constant time
as a goal for this implementation.
The symbol
T!!!
means that constant time was listed as a goal for this implementation,
but that the implementation failed TIMECOP.
(TIMECOP failures are not necessarily security issues;
they can sometimes be resolved by, e.g., declaring that a rejectionsampling condition is safe to declassify.)
There is a
separate page
with more information about each Diffie–Hellman system and each implementation.
Designers and implementors
interested in submitting new Diffie–Hellman systems
and new implementations of existing systems
should read the call for submissions.
Test results
Graphs:
(pkcycles,pkbytes)
(scycles,pkbytes)
Cycles to generate a key pair 
25%  50%  75%  system 
251819  251831  251844  T: kummer 
352748  352773  353013  T: curve25519 
369627  369682  369781  T: nistp256 
422465  423975  425176  T: surf127eps 
597572  604407  612053  T: sclaus1024 
1966366  1973346  1999521  T: ed521gs 
3007360  3029277  3052540  T: sclaus2048 
3607324  3625250  3648126  T: claus 

Cycles to compute a shared secret 
25%  50%  75%  system 
252555  252572  252766  T: kummer 
352438  353450  353452  T: curve25519 
402041  407233  409722  T: surf127eps 
572901  590826  608995  T: sclaus1024 
1302214  1302268  1304617  T: nistp256 
1965561  1969741  1995767  T: ed521gs 
2998921  3021827  3033116  T: sclaus2048 
3587994  3611731  3628557  T: claus 

