VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: armeabi; Cortex-A7 (410fc075); 2016 Broadcom BCM2836; 4 x 900MHz; berry2, supercop-20240425

[Page version: 20240720 10:46:07]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Implementation notes

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
383667385211389678
T:
r5nd1pke5d
531456534747542238
T:
r5nd1pke0d
847572850750861986
T:
r5nd3pke0d
858778862563874715
T:
r5nd3pke5d
116750211715991182071
T:
r5nd5pke0d
158099415884641603015
T:
r5nd5pke5d
657298465838626595134
T:
C:ntruees401ep2
780436078140347828480
T:
C:ntruees439ep1
139624031397804114000587
T:
C:ntruees593ep1
215850812161255621643614
T:
C:ntruees743ep1
467595394676765446782393
T:
r5n11pke0d
842854188466466084874246
T:
C:ntruees787ep1
909603139098054291004593
T:
r5n13pke0d
989496269914705199330547
T:
mcnie4q1281
141697978142466910143334286
T:
mcnie3q1281
169614387169857423170053795
T:
mcnie4q1282
172537394172566109173882095
T:
r5n15pke0d
203164347203983553205408276
T:
mcnie3q1282
235782724236027236236271892
T:
mcnie4q1921
264041677264545651265439494
T:
mcnie3q1921
304185604304592551304981657
T:
mcnie4q2561
317405189317696956318073699
T:
mcnie4q1922
358068843358772075360209059
T:
mcnie3q1922
377887414378493017379628101
T:
mcnie3q2561
418873725419318765419683116
T:
mcnie4q2562
617791288618831170620279889
T:
mcnie3q2562
645778801?1164883637?1715617344?
T:
ronald1024
141651421414168169741420427539
T:
r5n13pke0smallct
2017733293?3230759260?4747877572?
T:
ronald1536
3263367283?5708967982?10067686063?
T:
ronald2048
12036705372?21213424044?34924208714?
T:
ronald3072
Cycles to encrypt 59 bytes
25%50%75%system
177708178389179694
T:
C:ntruees401ep2
198791199727200584
T:
C:ntruees439ep1
266081268033273187
T:
ronald1024
295881296847298300
T:
C:ntruees593ep1
393539394933396503
T:
C:ntruees743ep1
408914412958439417
T:
ronald1536
605933632155660661
T:
ronald2048
637589639395642635
T:
r5nd1pke5d
807677809062811511
T:
C:ntruees787ep1
9924389954781001010
T:
r5nd1pke0d
106071910625941067696
T:
mcnie4q1281
115183511580011183977
T:
ronald3072
135540213588801368061
T:
r5nd3pke5d
142306814265161429714
T:
mcnie4q1282
158058815828481586309
T:
r5nd3pke0d
203394320366602038398
T:
mcnie4q1921
217498921778422181009
T:
r5nd5pke0d
235997823630742370247
T:
mcnie4q1922
239523623984262403244
T:
r5nd5pke5d
248455824929672497802
T:
mcnie3q1281
249736825008032503653
T:
mcnie4q2561
281954828773882881709
T:
mcnie4q2562
297705130341743036782
T:
mcnie3q1282
363644837078033715123
T:
mcnie3q1921
437371244065364415665
T:
mcnie3q1922
496049950711865085137
T:
mcnie3q2561
633913063810296392148
T:
mcnie3q2562
259726222600410826040976
T:
r5n13pke0smallct
446967144470801944715057
T:
r5n11pke0d
869701128698752187009975
T:
r5n13pke0d
201648655201707727201757937
T:
r5n15pke0d
Cycles to decrypt 59 bytes
25%50%75%system
278345279307280022
T:
C:ntruees401ep2
308506308985309758
T:
C:ntruees439ep1
473690475369476160
T:
C:ntruees593ep1
648983651536653160
T:
C:ntruees743ep1
862623867053869270
T:
r5nd1pke5d
142878914347531440119
T:
r5nd1pke0d
145283114552361460197
T:
C:ntruees787ep1
186600418706331877422
T:
r5nd3pke5d
227516922788182285586
T:
r5nd3pke0d
270614927155002727713
T:
mcnie4q1281
311841931207593124132
T:
r5nd5pke0d
337874733822863398585
T:
r5nd5pke5d
369609837045043714687
T:
mcnie4q1282
393588539430703948779
T:
mcnie3q1281
458116045899504595116
T:
mcnie4q1921
486014948677364874081
T:
mcnie3q1282
540025754101435433123
T:
mcnie4q1922
560445356236445633918
T:
mcnie4q2561
575405757707395783165
T:
mcnie3q1921
654791265620176568371
T:
mcnie4q2562
693172369558096964050
T:
mcnie3q1922
760446776125607631450
T:
mcnie3q2561
902455490852429129966
T:
ronald1024
987470598894099990915
T:
mcnie3q2562
237445952382099723899960
T:
ronald1536
458527434586402745872717
T:
r5n11pke0d
511984175124769451320126
T:
ronald2048
914978169152107391556152
T:
r5n13pke0d
989873159902509799075324
T:
r5n13pke0smallct
152187794152257785152415375
T:
ronald3072
207612393207676830207753941
T:
r5n15pke0d