VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key Diffie–Hellman secret-sharing systems on one machine: amd64; Golden Cove (906a4-40); 2022 Intel Core i3-1215U, P cores; 2 x 1600MHz; alder2,big, supercop-20260330

[Page version: 20260422 02:30:39]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key Diffie–Hellman secret-sharing systems:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each Diffie–Hellman system and each implementation. Designers and implementors interested in submitting new Diffie–Hellman systems and new implementations of existing systems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (scycles,pkbytes)

Cycles to generate a key pair
25%50%75%system
182381899120001
T:
jacfp127i
191621989320933
T:
kumjacfp127g
203522122122488
T:
prjfp127i
207972155622791
T:
hecfp127i
237812420824963curve25519
237142459025781
T:
jacfp128bk
263252702428639
T:
hecfp128bk
275272848429833
T:
prjfp128bk
280602890530180
T:
hecfp128i
281842929130725
T:
hecfp128fkt
288492929729983
T:
ecfp256e
293662976430888
T:
ecfp256h
300233022330517
T:
gls254
314843153831594
T:
gls254prot
326333317534066
T:
ecfp256s
333873352133712
T:
curve2251
337573418634851
T:
ecfp256q
371023720237354nistp256
386913872938772
T:
k277taa
421474221442307
T:
k298
498425043551094
T:
gls1271
518585190951963
T:
kummer
595715962759720
T:
k277mon
642456445164760
T:
kumfp127g
809108121881597
T:
kumfp128g
121594122844124612
T:
ed448goldilocks
133184134062135113
T:
ecfp256i
182538184355186057
T:
sclaus1024
592296598279606356
T:
ed521gs
754113760857769099
T:
nist521gs
923318924946928204
T:
claus
937972944937952078
T:
sclaus2048
Cycles to compute a shared secret
25%50%75%system
293902943829490
T:
gls254
314173145931506
T:
gls254prot
385673860038642
T:
k277taa
419644202742090
T:
k298
517675181451865
T:
kummer
595055957759620
T:
k277mon
655256570565904
T:
kumfp127g
666566677767054
T:
kumjacfp127g
667216685167005
T:
jacfp128bk
753587577376245curve25519
767127693277134
T:
prjfp128bk
786457888679212
T:
hecfp128fkt
798538011380312
T:
hecfp128bk
848108507485481
T:
kumfp128g
101432101673102070
T:
jacfp127i
117410117969118895
T:
ecfp256e
120574121099122518
T:
prjfp127i
121729122186123708
T:
hecfp127i
122407122659123033
T:
ecfp256i
123304125134127247
T:
gls1271
125951126276126706
T:
ecfp256q
133214133570133792
T:
curve2251
139465139916140561
T:
ecfp256h
140862142276143327nistp256
168097168579168872
T:
hecfp128i
171306171846172647
T:
ecfp256s
192444194120195326
T:
sclaus1024
383098385585391164
T:
ed448goldilocks
592926598914604326
T:
ed521gs
752435757323762969
T:
nist521gs
920113920806922603
T:
claus
946755961101964054
T:
sclaus2048