VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key Diffie–Hellman secret-sharing systems on one machine: amd64; Comet Lake (806ec); 2019 Intel Core i3-10110U; 2 x 2100MHz; comet, supercop-20241011

[Page version: 20241021 10:27:55]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key Diffie–Hellman secret-sharing systems:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each Diffie–Hellman system and each implementation. Designers and implementors interested in submitting new Diffie–Hellman systems and new implementations of existing systems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (scycles,pkbytes)

Cycles to generate a key pair
25%50%75%system
228042366024582
T:
jacfp127i
240472471125378
T:
kumjacfp127g
272932851429779
T:
prjfp127i
284482940930658
T:
hecfp127i
365983678537122
T:
gls254
383523856639446
T:
curve2251
386493868238710
T:
gls254prot
392034020441444
T:
hecfp128i
413194212543629
T:
ecfp256e
457374579446270
T:
k277taa
460534652247509
T:
ecfp256h
463964729449437
T:
ecfp256q
499995011950924
T:
k298
529815386753958
T:
kummer
709127103471819
T:
k277mon
717967264573297
T:
gls1271
802548035380440
T:
kumfp127g
111004111066111112
T:
kumfp128g
125260125569125811
T:
curve25519
153226153454153762
T:
ed448goldilocks
176615177769178998
T:
ecfp256i
176744178528180265
T:
sclaus1024
239068239456239818
T:
nistp256
513989516693518196
T:
surf2113
808759808992809451
T:
ed521gs
884831891310898453
T:
sclaus2048
943611944191944612
T:
nist521gs
981482982697984500
T:
claus
Cycles to compute a shared secret
25%50%75%system
357993583435864
T:
gls254
385313856538603
T:
gls254prot
455194557346092
T:
k277taa
497674987550565
T:
k298
525605265554049
T:
kummer
708927096971747
T:
k277mon
808098158881666
T:
kumfp127g
825968266282745
T:
kumjacfp127g
115311115360115412
T:
kumfp128g
124191124297124387
T:
jacfp127i
135134135426135680
T:
curve25519
144345144987145857
T:
curve2251
159783159931160135
T:
ecfp256e
165191165312165504
T:
prjfp127i
168256168387168533
T:
hecfp127i
169761169958170218
T:
ecfp256i
170005170207170565
T:
ecfp256q
180102180642182578
T:
gls1271
177832182292183458
T:
sclaus1024
194727194909195116
T:
ecfp256h
247104247292247475
T:
hecfp128i
466322466661467030
T:
ed448goldilocks
513821515131516366
T:
surf2113
613894614258614580
T:
nistp256
808755808935809136
T:
ed521gs
874143903110906190
T:
sclaus2048
943459943816944251
T:
nist521gs
977019977501978050
T:
claus