VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: armeabi; Cortex-A17 (410fc0d1); 2014 Rockchip RK3288; 4 x 1800MHz; tinker, supercop-20240909

[Page version: 20241120 00:41:14]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
254130255084256362
T:
r5nd1pke0d
312401313957317285
T:
r5nd1pke5d
394612396387398960
T:
r5nd3pke0d
398245399950402035
T:
r5nd3pke5d
540482541594545090
T:
r5nd5pke0d
707282709751713974
T:
r5nd5pke5d
202300362023422320243266
T:
r5n11pke0d
393373803935274439475326
T:
r5n13pke0d
490908054924336849422473
T:
lotus128
744136147445882274474150
T:
r5n15pke0d
744954427459045174678291
T:
mcnie4q1281
100741304101131728101536061
T:
mcnie3q1281
102334858102551896102769655
T:
lotus192
127777696127922923128044654
T:
mcnie4q1282
144507511145266916146420973
T:
mcnie3q1282
165032978165253405165497667
T:
mcnie4q1921
187203683187802749188432919
T:
mcnie3q1921
189896038190312228190631393
T:
lotus256
210888188211112986211357394
T:
mcnie4q2561
222241989222508536222784583
T:
mcnie4q1922
253795702254459767255566927
T:
mcnie3q1922
264926230265486820266025987
T:
mcnie3q2561
290430235290729912290938524
T:
mcnie4q2562
226581421?366777271?551690364?
T:
ronald1024
433716667434570730436236689
T:
mcnie3q2562
299705639?522838027?866389877?
T:
cargocult2048
276351865?573878592?863589283?
T:
rsa2048
710276697710729043711015734
T:
r5n13pke0smallct
740499445?1024186724?1392979210?
T:
ronald1536
1467251530?2145061531?2889819399?
T:
ronald2048
1845396931?2765262541?3919265014?
T:
ronald3072
2678727518?3231261537?3635775812?
T:
pqrsa15
3603327984?5988178775?8557002484?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
97478101687104465
T:
cargocult2048
97059101766103751
T:
rsa2048
128038128920133885
T:
ronald1024
186435187499195833
T:
ronald1536
264462270142276087
T:
ronald2048
459803467100475437
T:
ronald3072
490935492167493973
T:
r5nd1pke0d
625850627689629899
T:
r5nd1pke5d
650744652520654540
T:
r5nd3pke5d
697638698525699461
T:
mcnie4q1281
722342731310737891
T:
ronald4096
755841757690759897
T:
r5nd3pke0d
791847796487806670
T:
lotus128
942760944630946177
T:
mcnie4q1282
103183010348371038514
T:
r5nd5pke0d
111062811138601116649
T:
r5nd5pke5d
114941611505501152530
T:
mcnie4q1921
121051612161011232945
T:
lotus192
135868813601731361764
T:
mcnie4q1922
141216214130561414644
T:
mcnie4q2561
146253614669141471346
T:
mcnie3q1281
165324016561901662558
T:
mcnie4q2562
177046417792111789811
T:
lotus256
181367818159841817747
T:
mcnie3q1282
220584422093772214224
T:
mcnie3q1921
264686426554402663130
T:
mcnie3q1922
300629030112723016524
T:
mcnie3q2561
383378038382163851738
T:
mcnie3q2562
130410131305377613071268
T:
r5n13pke0smallct
193320441934524019361320
T:
r5n11pke0d
347714973478571034799060
T:
r5n13pke0d
604108076042302560599533
T:
r5n15pke0d
735411427361446573687919
T:
pqrsa15
Cycles to decrypt 59 bytes
25%50%75%system
698985700518701741
T:
r5nd1pke0d
896734898397900353
T:
r5nd3pke5d
917536919469921580
T:
r5nd1pke5d
100185910058381013309
T:
lotus128
107702010804361082133
T:
r5nd3pke0d
148016414815131483666
T:
r5nd5pke0d
155256715544681556778
T:
r5nd5pke5d
161307016358671646109
T:
lotus192
183661118459581850852
T:
mcnie4q1281
237389123814352392162
T:
lotus256
242373024283352431923
T:
mcnie3q1281
251123225149362521200
T:
mcnie4q1282
296341429660242968967
T:
mcnie4q1921
305719830643583069823
T:
mcnie3q1282
349556235124063532121
T:
ronald1024
352019535255923529407
T:
mcnie4q1922
358741535928083601815
T:
mcnie3q1921
363761936466153659725
T:
mcnie4q2561
426754342715944278180
T:
mcnie4q2562
434188143468194353178
T:
mcnie3q1922
475324247599674765867
T:
mcnie3q2561
621526862262916239094
T:
mcnie3q2562
769596077289937778555
T:
ronald1536
106846431069842410708531
T:
rsa2048
107007691071492710740815
T:
cargocult2048
151426811519639015250477
T:
ronald2048
199841732000089820012153
T:
r5n11pke0d
370278833704251337057911
T:
r5n13pke0d
381665133824834138340572
T:
ronald3072
489778224905118849098322
T:
r5n13pke0smallct
632784696329101863447811
T:
r5n15pke0d
766475397691993777078091
T:
ronald4096
571846952572466304572968146
T:
pqrsa15