VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: armeabi; Cortex-A8 (413fc082); 2012 TI Sitara XAM3359AZCZ100; 1 x 1000MHz; bblack, supercop-20240716

[Page version: 20241120 00:41:14]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: old (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
432184435944444312
T:
r5nd1pke5d
645600651344662976
T:
r5nd1pke0d
106787210784561107624
T:
r5nd3pke0d
106808010800321103864
T:
r5nd3pke5d
149876815133521543808
T:
r5nd5pke0d
210548821244482143488
T:
r5nd5pke5d
467359684677696846857376
T:
r5n11pke0d
819475688212730482358248
T:
mcnie4q1281
903147689038444890559776
T:
r5n13pke0d
109787136110304696111146664
T:
mcnie3q1281
140512928140702272141162168
T:
mcnie4q1282
157117616158089656159758904
T:
mcnie3q1282
172165312172302240172554928
T:
r5n15pke0d
180927888181235504181591320
T:
mcnie4q1921
203060432203937240205400712
T:
mcnie3q1921
228909656229092400229637368
T:
mcnie4q2561
243532496243858080244440176
T:
mcnie4q1922
265805000266012024266495720
T:
lotus128
275487072276372368277608864
T:
mcnie3q1922
283536816284533552286442728
T:
mcnie3q2561
316603496317156552317793984
T:
mcnie4q2562
468483112469707968471198696
T:
mcnie3q2562
568519672569051384569790088
T:
lotus192
103196047210451968321084948944
T:
lotus256
711492296?1101356744?1888864400?
T:
ronald1024
193944104019515989521969500344
T:
r5n13pke0smallct
1533171384?2586424600?4008633856?
T:
ronald1536
3329119576?5570884176?8462569816?
T:
ronald2048
7544780848?12762955272?22877561536?
T:
ronald3072
17829250848?34908420704?47353036992?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
216192216832241616
T:
ronald1024
312944322360348408
T:
ronald1536
446400470360503056
T:
ronald2048
676128679256689520
T:
r5nd1pke5d
814544839632861888
T:
ronald3072
9798329838321013376
T:
mcnie4q1281
116353611732481198400
T:
r5nd1pke0d
128015213032001332688
T:
ronald4096
130685613153121347480
T:
mcnie4q1282
158660015965521625808
T:
mcnie4q1921
159426416135121637592
T:
r5nd3pke5d
185262418803281899672
T:
mcnie4q1922
191516819401281958288
T:
mcnie4q2561
192533619519921966496
T:
r5nd3pke0d
195483219773681994536
T:
mcnie3q1281
224598422740722285856
T:
mcnie4q2562
240726424338962461640
T:
mcnie3q1282
275163227830882806928
T:
r5nd5pke0d
295287229799923013072
T:
mcnie3q1921
300403230176643034376
T:
r5nd5pke5d
351427235389763582512
T:
mcnie3q1922
391149639301203952992
T:
mcnie3q2561
524318452862325350976
T:
mcnie3q2562
721180872274727242488
T:
lotus128
112474241126617611304096
T:
lotus192
161125921613084816172520
T:
lotus256
259280402598903226107656
T:
r5n13pke0smallct
420347124207408042163520
T:
r5n11pke0d
805296648060579280759800
T:
r5n13pke0d
164437496164595920164712696
T:
r5n15pke0d
Cycles to decrypt 59 bytes
25%50%75%system
939336949120975048
T:
r5nd1pke5d
175067217634241787256
T:
r5nd1pke0d
226397622916482304696
T:
r5nd3pke5d
290645629372802980376
T:
mcnie4q1281
296274429787522991456
T:
r5nd3pke0d
367146436972563722592
T:
mcnie3q1281
371371237349203760552
T:
mcnie4q1282
408111241082324133024
T:
mcnie4q1921
421372842322804259304
T:
r5nd5pke0d
432789643393924361024
T:
r5nd5pke5d
479304048224564850784
T:
mcnie4q1922
491512049682885011736
T:
ronald1024
500862450427445084272
T:
mcnie3q1282
512390451631525199576
T:
mcnie4q2561
528711253139845361688
T:
mcnie3q1921
582016058648725925656
T:
mcnie4q2562
660425666414246685128
T:
mcnie3q1922
688032869178246962320
T:
mcnie3q2561
864625686606728759536
T:
lotus128
926414493110169367592
T:
mcnie3q2562
112856721133242411411176
T:
ronald1536
137832321388314413923472
T:
lotus192
201638482017896020296880
T:
lotus256
226407282273601622808968
T:
ronald2048
430908164313166443210376
T:
r5n11pke0d
599084806001659260188768
T:
ronald3072
819862728210222482259800
T:
r5n13pke0smallct
842156328429832884427576
T:
r5n13pke0d
124707872125066560125817168
T:
ronald4096
169381872169494240169747160
T:
r5n15pke0d