VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key Diffie–Hellman secret-sharing systems on one machine: amd64; Silvermont (406c4); 2016 Intel Atom x5-Z8350; 4 x 1440MHz; cherry, supercop-20241011

[Page version: 20241021 10:27:55]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key Diffie–Hellman secret-sharing systems:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each Diffie–Hellman system and each implementation. Designers and implementors interested in submitting new Diffie–Hellman systems and new implementations of existing systems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (scycles,pkbytes)

Cycles to generate a key pair
25%50%75%system
649556608668618
T:
jacfp127i
685877119275524
T:
kumjacfp127g
720847286474808
T:
prjfp127i
733317391975430
T:
hecfp127i
104907106461108555
T:
ecfp256e
109473112440120674
T:
ecfp256h
113165114708117007
T:
hecfp128i
111891115885119790
T:
curve2251
116036119700123047
T:
ecfp256q
140354142989145329
T:
gls254
186226188805190482
T:
gls1271
205793205972207210
T:
gls254prot
280653280724280877
T:
kumfp127g
287772287891288253
T:
k277taa
305984307271311105
T:
k298
422305422392422659
T:
k277mon
447358447503447943
T:
kumfp128g
448520448653449060
T:
curve25519
507429510968514844
T:
ecfp256i
552632554222555219
T:
kummer
614692617484619416
T:
nistp256
765230766930771143
T:
ed448goldilocks
775452782604790392
T:
sclaus1024
113972811490521158785
T:
surf2113
366042436642333670268
T:
ed521gs
380089238276033852737
T:
sclaus2048
432392343275034331834
T:
nist521gs
465820846708584682649
T:
claus
Cycles to compute a shared secret
25%50%75%system
135022139976141170
T:
gls254
205346205510205732
T:
gls254prot
283361283471283651
T:
kumfp127g
286633286723286917
T:
kumjacfp127g
287586287682287868
T:
k277taa
305773307260308558
T:
k298
422067422118422226
T:
k277mon
426523429950430305
T:
curve2251
435283436147436837
T:
gls1271
443439444675447430
T:
jacfp127i
448399448467448685
T:
curve25519
457709457787457890
T:
kumfp128g
480613481476483564
T:
ecfp256e
502875504257507193
T:
ecfp256q
507827509204511710
T:
ecfp256i
522837525054527541
T:
prjfp127i
535125536164539064
T:
hecfp127i
552232554002555028
T:
kummer
601746604035606459
T:
ecfp256h
791641795213796891
T:
sclaus1024
808929810929814921
T:
hecfp128i
112907511415681155000
T:
surf2113
208936220955542099816
T:
nistp256
264779126495682656595
T:
ed448goldilocks
365961236611063665228
T:
ed521gs
377261037864643853377
T:
sclaus2048
431691143231994326289
T:
nist521gs
465536646744974688304
T:
claus