VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key Diffie–Hellman secret-sharing systems on one machine: amd64; Haswell+AES (306c3); 2013 Intel Core i7-4770; 4 x 3400MHz; speed2supercop, supercop-20260330

[Page version: 20260412 01:54:49]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key Diffie–Hellman secret-sharing systems:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each Diffie–Hellman system and each implementation. Designers and implementors interested in submitting new Diffie–Hellman systems and new implementations of existing systems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (scycles,pkbytes)

Cycles to generate a key pair
25%50%75%system
279133159132848
T:
jacfp127i
296353254733711
T:
kumjacfp127g
317043466536182
T:
prjfp127i
341913910841106
T:
hecfp127i
372674061841720
T:
jacfp128bk
417184238044767
T:
curve2251
444524503846514
T:
ecfp256e
450404515645468curve25519
447464534045949
T:
gls254
430654631347823
T:
prjfp128bk
464184899752474
T:
hecfp128fkt
482574908851815
T:
ecfp256s
494574951149579
T:
gls254prot
462304960050734
T:
hecfp128i
467095165253736
T:
hecfp128bk
519735313256081
T:
ecfp256q
633126346063536
T:
k277taa
684156855968642
T:
kummer
715817187072406
T:
k298
753067545476410nistp256
953349539395490
T:
k277mon
110971?111077?144533?
T:
kumfp127g
157436157532157607
T:
kumfp128g
167392168597169851
T:
sclaus1024
174077174299174541
T:
ed448goldilocks
209508210657212016
T:
ecfp256i
212723213576214276
T:
surf127eps
240211241482242874
T:
ecfp256h
260883268169278480
T:
hector
529688531966533030
T:
surf2113
833619837144838849
T:
sclaus2048
103200410373281038198
T:
ed521gs
111207611165571143799
T:
claus
117719011807991189841
T:
nist521gs
Cycles to compute a shared secret
25%50%75%system
408324134041437
T:
gls254
492594936849446
T:
gls254prot
631866335863419
T:
k277taa
683436848968575
T:
kummer
713577157471945
T:
k298
952229529195377
T:
k277mon
112283112436112550
T:
kumfp127g
112586113133113491
T:
jacfp128bk
121186121290121396
T:
kumjacfp127g
140057140247140444
T:
prjfp128bk
147157147323147507
T:
hecfp128fkt
149340149531149739
T:
hecfp128bk
158671158937159190
T:
curve2251
160121160317160477curve25519
162726162823162912
T:
kumfp128g
186204186419186667
T:
jacfp127i
192683192779192928
T:
ecfp256e
197326197509197708
T:
ecfp256q
200922201060201243
T:
ecfp256i
207052207445207895
T:
surf127eps
220026220374223734
T:
sclaus1024
225749226120226658
T:
prjfp127i
231208231317231451
T:
ecfp256h
231125231328231581
T:
hecfp127i
253047253205253385
T:
ecfp256s
296670296730297204nistp256
327113327364327716
T:
hecfp128i
526756530785531110
T:
surf2113
534920535074535310
T:
ed448goldilocks
853924869174874995
T:
hector
103204010367361037682
T:
ed521gs
110479911077311114069
T:
sclaus2048
117684611791601189045
T:
nist521gs
129565612986061333152
T:
claus