VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key Diffie–Hellman secret-sharing systems on one machine: amd64; Redwood Cove (a06a4-40); 2023 Intel Core Ultra 5 125H, P cores; 4 x 1200MHz; meteor,big, supercop-20260330

[Page version: 20260413 04:19:33]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key Diffie–Hellman secret-sharing systems:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each Diffie–Hellman system and each implementation. Designers and implementors interested in submitting new Diffie–Hellman systems and new implementations of existing systems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (scycles,pkbytes)

Cycles to generate a key pair
25%50%75%system
216312259323810
T:
jacfp127i
219422291724175
T:
kumjacfp127g
219212321125302
T:
hecfp127i
238522397024152curve25519
232822436825864
T:
prjfp127i
268892776329008
T:
jacfp128bk
279592833629833
T:
ecfp256e
269432835030450
T:
prjfp128bk
284192940231633
T:
hecfp128bk
284903025432393
T:
hecfp128i
302283053230811
T:
gls254
303423146233010
T:
hecfp128fkt
315363159931668
T:
gls254prot
314933191132911
T:
ecfp256s
329003338534929
T:
ecfp256q
333603351934010
T:
curve2251
375283763837778nistp256
386423868338740
T:
k277taa
428414289743025
T:
k298
519565205464344
T:
kummer
609466101661097
T:
k277mon
635916387064220
T:
kumfp127g
788177902879281
T:
kumfp128g
131220131982132933
T:
ecfp256i
142326142772143371
T:
ed448goldilocks
148755149751150940
T:
ecfp256h
183026185248187399
T:
sclaus1024
609652613656619820
T:
ed521gs
773148776439781802
T:
nist521gs
924610925571929931
T:
claus
947214954226960520
T:
sclaus2048
Cycles to compute a shared secret
25%50%75%system
294372947729523
T:
gls254
314593151331563
T:
gls254prot
385583860838655
T:
k277taa
426814274642803
T:
k298
518085185451902
T:
kummer
608776094461009
T:
k277mon
648526506965421
T:
kumfp127g
660596628866500
T:
jacfp128bk
667296694367185
T:
kumjacfp127g
752357536875637curve25519
757007593676171
T:
prjfp128bk
777977828078713
T:
hecfp128fkt
788987927279717
T:
hecfp128bk
826608285683123
T:
kumfp128g
101301101722102089
T:
jacfp127i
117007117620118562
T:
ecfp256e
119965120833121641
T:
prjfp127i
121064121636122246
T:
hecfp127i
122006122356122779
T:
ecfp256i
125542125976126630
T:
ecfp256q
134000134196134424
T:
curve2251
137817138025138201nistp256
139271140079141423
T:
ecfp256h
166611166929167256
T:
hecfp128i
171296171665171998
T:
ecfp256s
189016193245194533
T:
sclaus1024
414307414882415432
T:
ed448goldilocks
607827611467615451
T:
ed521gs
771619775617780770
T:
nist521gs
924226925045928932
T:
claus
961160962320963631
T:
sclaus2048