VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: armeabi; ARM1176 (410fb767); 2011 Broadcom BCM2835; 1 x 1000MHz; berry0, supercop-20240909

[Page version: 20260221 06:44:50]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
686847689707707260
T:
r5nd1pke5d
965860975469995083
T:
r5nd1pke0d
158037415850611606542
T:
r5nd3pke0d
161515516204451650005
T:
r5nd3pke5d
219089122032792231088
T:
r5nd5pke0d
303740630486553077380
T:
r5nd5pke5d
574875915754562457634731
T:
r5n11pke0d
102261401102470021102731464
T:
mcnie4q1281
114374794114446261114610621
T:
r5n13pke0d
137692334138362399139499327
T:
mcnie3q1281
176111120176468010176748502
T:
mcnie4q1282
197720375199592561201847480
T:
mcnie3q1282
218240221218313154218493170
T:
r5n15pke0d
228422305228744680229212383
T:
mcnie4q1921
256793339257639003259501403
T:
mcnie3q1921
290484198290831221291482644
T:
mcnie4q2561
308019482308443294308951596
T:
mcnie4q1922
348996642351290162354387004
T:
mcnie3q1922
360483039361484275363243275
T:
mcnie3q2561
402012680402442272403105523
T:
mcnie4q2562
595657000597284213601227622
T:
mcnie3q2562
758913582759544125760189639
T:
lotus128
790625339?1318659996?1969411237?
T:
ronald1024
732682779?1342674713?2027826520?
T:
cargocult2048
894470361?1384850927?2056072635?
T:
rsa2048
183933907718398526171841009375
T:
lotus192
259016968725904383242591516897
T:
r5n13pke0smallct
339146364633922263993393217221
T:
lotus256
2355834481?4077194844?5662524971?
T:
ronald1536
4787219551?8162940452?12204074989?
T:
ronald2048
14166169190?19447850114?31094848127?
T:
ronald3072
343340007773510359905136213479242
T:
pqrsa15
Cycles to encrypt 59 bytes
25%50%75%system
220650241750251940
T:
cargocult2048
219209242045257727
T:
rsa2048
426815451007476920
T:
ronald1024
606193616820663326
T:
ronald1536
862728893064942540
T:
ronald2048
132268013341271367615
T:
mcnie4q1281
136560413692581377490
T:
r5nd1pke5d
154881115876631639116
T:
ronald3072
177563017922371830617
T:
mcnie4q1282
189708819187491936823
T:
r5nd1pke0d
212150521294552176550
T:
mcnie4q1921
250133825197452564022
T:
mcnie4q1922
255293525745522617029
T:
mcnie4q2561
259651126208632684795
T:
mcnie3q1281
301084130457793084725
T:
mcnie4q2562
309533331117253161640
T:
r5nd3pke0d
318274831948133245620
T:
r5nd3pke5d
320604232531053294293
T:
mcnie3q1282
391300039639154012145
T:
mcnie3q1921
430866443293144376720
T:
r5nd5pke0d
473626347927134845363
T:
mcnie3q1922
517103252105705252375
T:
mcnie3q2561
596448060051846031621
T:
r5nd5pke5d
700616070509187091197
T:
mcnie3q2562
139872301402221014086075
T:
lotus128
215895102161625021667565
T:
lotus192
308473733089321830974005
T:
lotus256
363944533646589836553290
T:
r5n13pke0smallct
547979795486467554965063
T:
r5n11pke0d
109501504109621038109745726
T:
r5n13pke0d
187759150188193135188603537
T:
pqrsa15
362574422363148377363712879
T:
r5n15pke0d
Cycles to decrypt 59 bytes
25%50%75%system
200419820140932036645
T:
r5nd1pke5d
276627228191582837095
T:
r5nd1pke0d
400999840535854114522
T:
mcnie4q1281
454576145911374634343
T:
r5nd3pke0d
476216748009204840380
T:
r5nd3pke5d
492716349887855030177
T:
mcnie3q1281
506721351302635181295
T:
mcnie4q1282
557990856209755668570
T:
mcnie4q1921
631782063729536388187
T:
r5nd5pke0d
661555267219956859669
T:
mcnie4q1922
694632770264347140112
T:
mcnie4q2561
700436770607157127695
T:
mcnie3q1282
788062879279077983183
T:
mcnie4q2562
830151083563768407732
T:
mcnie3q1921
894360590222879117885
T:
mcnie3q1922
906922290784789095020
T:
r5nd5pke5d
100697831011011010167282
T:
mcnie3q2561
120076031208448512250183
T:
ronald1024
124724851257606712628812
T:
mcnie3q2562
174317171745917517474180
T:
lotus128
229083382295194022997764
T:
rsa2048
229098772297517723036160
T:
cargocult2048
277653932780743527859868
T:
lotus192
304453083055089330688438
T:
ronald1536
405917264063924340713078
T:
lotus256
563915985646388856579748
T:
r5n11pke0d
641811916436948664716856
T:
ronald2048
115044979115190399115286334
T:
r5n13pke0d
119056869119197399119373006
T:
r5n13pke0smallct
187289709187565517187910339
T:
ronald3072
369016215369638212370756432
T:
r5n15pke0d
124348979812440982911245076478
T:
pqrsa15