VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: armeabi; Cortex-A9+NEON (412fc09a); 2011 Freescale i.MX6 Quad; 4 x 1200MHz; unstable; novena, supercop-20220506

[Page version: 20240726 23:45:41]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Implementation notes

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
276578277573280894
T:
r5nd1pke5d
387803389797394030
T:
r5nd1pke0d
630185633506641474
T:
r5nd3pke0d
632508635250641804
T:
r5nd3pke5d
883187887836895140
T:
r5nd5pke0d
117105511770321189648
T:
r5nd5pke5d
266414626804342699691
T:
C:ntruees401ep2
318411532046793219953
T:
C:ntruees439ep1
4394046?5494342?5525552?
T:
C:ntruees593ep1
852835885562878589084
T:
C:ntruees743ep1
351186943517435135198921
T:
r5n11pke0d
566705035683073056870207
T:
r5n13pke0d
787480807894928979194557
T:
mcnie4q1281
99200741100290721100984654
T:
r5n15pke0d
109440840?112160543?138332358?
T:
mcnie3q1281
135930688137410198167056180
T:
mcnie4q1282
157484029159275305161911946
T:
mcnie3q1282
183048386184607337219059104
T:
mcnie4q1921
170227913?212109664?213148573?
T:
C:ntruees787ep1
232320193232900118233613452
T:
mcnie4q2561
236094832241172003278390550
T:
mcnie3q1921
245116358245890107250801665
T:
mcnie4q1922
278718110281308914335840687
T:
mcnie3q1922
288783232291817659321925185
T:
mcnie3q2561
321335510321817280322733068
T:
mcnie4q2562
375706901384845178420145772
T:
lotus128
474464628476526551479807382
T:
mcnie3q2562
725108782806673961827858622
T:
lotus192
664193420?1123415849?1786691861?
T:
ronald1024
125780078614023810541541155651
T:
lotus256
140261553114215764261423075235
T:
r5n13pke0smallct
1503710572?2388990800?4142461909?
T:
ronald1536
2886375668?4211780032?7793324535?
T:
ronald2048
8309876230?14051151012?22186436585?
T:
ronald3072
14185322107?25854709808?43081511784?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
120526121521122848
T:
C:ntruees401ep2
134469135134136463
T:
C:ntruees439ep1
153395?190914?192908?
T:
C:ntruees593ep1
196890197888202535
T:
ronald1024
205669?209368?258648?
T:
C:ntruees743ep1
281225286870308451
T:
ronald1536
392123415364438938
T:
ronald2048
461184462843465829
T:
r5nd1pke5d
427184?530904?534229?
T:
C:ntruees787ep1
609268?708542?892497?
T:
ronald3072
753361763987905270
T:
r5nd1pke0d
905104909736922022
T:
mcnie4q1281
9116639496821097681
T:
ronald4096
101267610272861218095
T:
r5nd3pke5d
122682212450821473314
T:
mcnie4q1282
126701112709931283609
T:
r5nd3pke0d
170461717129211720885
T:
r5nd5pke0d
178530317955831809861
T:
mcnie4q1922
153958818245461911140
T:
mcnie4q1921
185469618662871876610
T:
mcnie4q2561
1516004?1897202?2362050?
T:
mcnie3q1281
191744919257491933375
T:
r5nd5pke5d
232551423338142348431
T:
mcnie3q1282
2187376?2735857?2779719?
T:
mcnie4q2562
343348934710074147925
T:
mcnie3q1922
345307834743313494583
T:
mcnie3q1921
386312238764033896002
T:
mcnie3q2561
490933549485264983271
T:
mcnie3q2562
587352671465507174825
T:
lotus128
9062491?9252655?11358644?
T:
lotus192
130903831321420813465755
T:
lotus256
203086902041095620604049
T:
r5n13pke0smallct
393489063944731439484501
T:
r5n11pke0d
544149695445141954914665
T:
r5n13pke0d
127534794128024529139113163
T:
r5n15pke0d
Cycles to decrypt 59 bytes
25%50%75%system
171325172321173981
T:
C:ntruees401ep2
190251191578193238
T:
C:ntruees439ep1
225471?280229?282222?
T:
C:ntruees593ep1
315240?318669?395442?
T:
C:ntruees743ep1
611591613251615242
T:
r5nd1pke5d
754304?936977?947260?
T:
C:ntruees787ep1
108373010953471307703
T:
r5nd1pke0d
136462313792271643727
T:
r5nd3pke5d
179824118052241814516
T:
r5nd3pke0d
237992424012112425787
T:
mcnie4q1281
245897024692752475570
T:
r5nd5pke0d
261335926216752628981
T:
r5nd5pke5d
2538292?3172518?3945809?
T:
mcnie3q1281
319737132186213821898
T:
mcnie4q1282
402316540407674061685
T:
mcnie3q1282
442424344378274466079
T:
mcnie4q1922
376646644919584699162
T:
mcnie4q1921
455033945706404598889
T:
mcnie4q2561
518326052114975262293
T:
mcnie3q1921
554482255703975599273
T:
ronald1024
566338557155096841336
T:
mcnie3q1922
611194861431606165735
T:
mcnie3q2561
5329989?6651054?6695632?
T:
mcnie4q2562
8118032822543510114197
T:
mcnie3q2562
726172589189758953174
T:
lotus128
127497901280023912884206
T:
ronald1536
11701372?14589029?14653016?
T:
lotus192
14223099?17153125?21523092?
T:
lotus256
256722322574652526113080
T:
ronald2048
403437364037253840494191
T:
r5n11pke0d
568161635690641256958539
T:
r5n13pke0d
649457546518131665381194
T:
r5n13pke0smallct
567694296834210168548601
T:
ronald3072
114788830118698536143134973
T:
ronald4096
130776016130985595142374984
T:
r5n15pke0d