VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key Diffie–Hellman secret-sharing systems on one machine: amd64; Raptor Cove (b06a2-40); 2024 Intel Core 5 210H, P cores; 4 x 2200MHz; freshwrap,big, supercop-20260330

[Page version: 20260503 04:12:56]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key Diffie–Hellman secret-sharing systems:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each Diffie–Hellman system and each implementation. Designers and implementors interested in submitting new Diffie–Hellman systems and new implementations of existing systems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (scycles,pkbytes)

Cycles to generate a key pair
25%50%75%system
195952035421211
T:
jacfp127i
196652055621613
T:
kumjacfp127g
223052291823922
T:
hecfp127i
223972321124041
T:
prjfp127i
238832398124078curve25519
243392524126304
T:
jacfp128bk
281362847429186
T:
ecfp256e
287712956530444
T:
prjfp128bk
293212999330781
T:
hecfp128bk
296423029931120
T:
hecfp128fkt
296573039231091
T:
hecfp128i
302013046430778
T:
gls254
316093167831753
T:
gls254prot
316073198832762
T:
ecfp256s
330713352734664
T:
ecfp256q
335273364234082
T:
curve2251
371003719437311nistp256
387533879438846
T:
k277taa
428724293143055
T:
k298
526895400554214
T:
kummer
608616095861098
T:
k277mon
641936460264848
T:
kumfp127g
807508103681298
T:
kumfp128g
131479132100133022
T:
ed448goldilocks
131698132607133654
T:
ecfp256i
149260150204151239
T:
ecfp256h
182835184320186127
T:
sclaus1024
578127579819581756
T:
ed521gs
756104759595765774
T:
nist521gs
923644924921926630
T:
claus
941606948787955170
T:
sclaus2048
Cycles to compute a shared secret
25%50%75%system
295242957529628
T:
gls254
315253158731649
T:
gls254prot
386193866338712
T:
k277taa
426694271942779
T:
k298
520525212952226
T:
kummer
607606082260921
T:
k277mon
651006521465458
T:
kumfp127g
659656608666230
T:
jacfp128bk
666296678367218
T:
kumjacfp127g
751007546575696curve25519
761577632076489
T:
prjfp128bk
781917833878514
T:
hecfp128fkt
797107996680193
T:
hecfp128bk
847448493385126
T:
kumfp128g
101369101570102109
T:
jacfp127i
117015117240117606
T:
ecfp256e
119721120415121091
T:
prjfp127i
122087122526123068
T:
ecfp256i
122333122841123028
T:
hecfp127i
126029126391126853
T:
ecfp256q
133574134000134261
T:
curve2251
138972139308139844
T:
ecfp256h
139198139558140138nistp256
167081167332167649
T:
hecfp128i
171002171701172384
T:
ecfp256s
187670190472191315
T:
sclaus1024
395582396933401241
T:
ed448goldilocks
578099579363581200
T:
ed521gs
759151763583766308
T:
nist521gs
923504924392925389
T:
claus
965959966969968212
T:
sclaus2048