VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: armeabi; ARM1176 (410fb767); 2011 Broadcom BCM2835; 1 x 1000MHz; berry0, supercop-20240909

[Page version: 20250206 00:56:05]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
686847689707707260
T:
r5nd1pke5d
965860975469995083
T:
r5nd1pke0d
158037415850611606542
T:
r5nd3pke0d
161515516204451650005
T:
r5nd3pke5d
219089122032792231088
T:
r5nd5pke0d
303740630486553077380
T:
r5nd5pke5d
574875915754562457634731
T:
r5n11pke0d
102261401102470021102731464
T:
mcnie4q1281
114374794114446261114610621
T:
r5n13pke0d
137692334138362399139499327
T:
mcnie3q1281
176111120176468010176748502
T:
mcnie4q1282
197720375199592561201847480
T:
mcnie3q1282
218240221218313154218493170
T:
r5n15pke0d
228422305228744680229212383
T:
mcnie4q1921
256793339257639003259501403
T:
mcnie3q1921
290484198290831221291482644
T:
mcnie4q2561
308019482308443294308951596
T:
mcnie4q1922
348996642351290162354387004
T:
mcnie3q1922
360483039361484275363243275
T:
mcnie3q2561
402012680402442272403105523
T:
mcnie4q2562
595657000597284213601227622
T:
mcnie3q2562
758913582759544125760189639
T:
lotus128
790625339?1318659996?1969411237?
T:
ronald1024
732682779?1342674713?2027826520?
T:
cargocult2048
894470361?1384850927?2056072635?
T:
rsa2048
183933907718398526171841009375
T:
lotus192
259016968725904383242591516897
T:
r5n13pke0smallct
339146364633922263993393217221
T:
lotus256
2355834481?4077194844?5662524971?
T:
ronald1536
4787219551?8162940452?12204074989?
T:
ronald2048
14166169190?19447850114?31094848127?
T:
ronald3072
343340007773510359905136213479242
T:
pqrsa15
Cycles to encrypt 59 bytes
25%50%75%system
220650241750251940
T:
cargocult2048
219209242045257727
T:
rsa2048
426815451007476920
T:
ronald1024
606193616820663326
T:
ronald1536
862728893064942540
T:
ronald2048
132268013341271367615
T:
mcnie4q1281
136560413692581377490
T:
r5nd1pke5d
154881115876631639116
T:
ronald3072
177563017922371830617
T:
mcnie4q1282
189708819187491936823
T:
r5nd1pke0d
212150521294552176550
T:
mcnie4q1921
250133825197452564022
T:
mcnie4q1922
255293525745522617029
T:
mcnie4q2561
259651126208632684795
T:
mcnie3q1281
301084130457793084725
T:
mcnie4q2562
309533331117253161640
T:
r5nd3pke0d
318274831948133245620
T:
r5nd3pke5d
320604232531053294293
T:
mcnie3q1282
391300039639154012145
T:
mcnie3q1921
430866443293144376720
T:
r5nd5pke0d
473626347927134845363
T:
mcnie3q1922
517103252105705252375
T:
mcnie3q2561
596448060051846031621
T:
r5nd5pke5d
700616070509187091197
T:
mcnie3q2562
139872301402221014086075
T:
lotus128
215895102161625021667565
T:
lotus192
308473733089321830974005
T:
lotus256
363944533646589836553290
T:
r5n13pke0smallct
547979795486467554965063
T:
r5n11pke0d
109501504109621038109745726
T:
r5n13pke0d
187759150188193135188603537
T:
pqrsa15
362574422363148377363712879
T:
r5n15pke0d
Cycles to decrypt 59 bytes
25%50%75%system
200419820140932036645
T:
r5nd1pke5d
276627228191582837095
T:
r5nd1pke0d
400999840535854114522
T:
mcnie4q1281
454576145911374634343
T:
r5nd3pke0d
476216748009204840380
T:
r5nd3pke5d
492716349887855030177
T:
mcnie3q1281
506721351302635181295
T:
mcnie4q1282
557990856209755668570
T:
mcnie4q1921
631782063729536388187
T:
r5nd5pke0d
661555267219956859669
T:
mcnie4q1922
694632770264347140112
T:
mcnie4q2561
700436770607157127695
T:
mcnie3q1282
788062879279077983183
T:
mcnie4q2562
830151083563768407732
T:
mcnie3q1921
894360590222879117885
T:
mcnie3q1922
906922290784789095020
T:
r5nd5pke5d
100697831011011010167282
T:
mcnie3q2561
120076031208448512250183
T:
ronald1024
124724851257606712628812
T:
mcnie3q2562
174317171745917517474180
T:
lotus128
229083382295194022997764
T:
rsa2048
229098772297517723036160
T:
cargocult2048
277653932780743527859868
T:
lotus192
304453083055089330688438
T:
ronald1536
405917264063924340713078
T:
lotus256
563915985646388856579748
T:
r5n11pke0d
641811916436948664716856
T:
ronald2048
115044979115190399115286334
T:
r5n13pke0d
119056869119197399119373006
T:
r5n13pke0smallct
187289709187565517187910339
T:
ronald3072
369016215369638212370756432
T:
r5n15pke0d
124348979812440982911245076478
T:
pqrsa15