VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key Diffie–Hellman secret-sharing systems on one machine: aarch64; Cortex-A76 (414fd0b1); 2023 Broadcom BCM2712; 4 x 1500MHz; pi5, supercop-20251222

[Page version: 20260221 06:44:44]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key Diffie–Hellman secret-sharing systems:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each Diffie–Hellman system and each implementation. Designers and implementors interested in submitting new Diffie–Hellman systems and new implementations of existing systems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (scycles,pkbytes)

Cycles to generate a key pair
25%50%75%system
492024923249264curve25519
685646861968687nistp256
182738183422184372
T:
kummer
365140366962368510
T:
surf127eps
437188440353442206
T:
sclaus1024
184288718435661844820
T:
ed521gs
223848522490332253979
T:
sclaus2048
227286222735482274432
T:
nist521gs
293890129431002945302
T:
claus
Cycles to compute a shared secret
25%50%75%system
111539111550111559curve25519
181963182653183108
T:
kummer
243600243709243824nistp256
350307351143353102
T:
surf127eps
591312592054602622
T:
sclaus1024
184177218422541844128
T:
ed521gs
227350222742722274926
T:
nist521gs
289590929545842971457
T:
sclaus2048
352281035230053531542
T:
claus