VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: armeabi; Cortex-A7 (410fc075); 2016 Broadcom BCM2836; 4 x 900MHz; berry2, supercop-20251114

[Page version: 20260221 06:44:50]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
627174630977635757
T:
r5nd1pke5d
913808918850926312
T:
r5nd1pke0d
149060914949091503730
T:
r5nd3pke0d
151890215256631535290
T:
r5nd3pke5d
205500020626632071146
T:
r5nd5pke0d
285046428603822874762
T:
r5nd5pke5d
667397466862326698550
T:
C:ntruees401ep2
792096779367227955334
T:
C:ntruees439ep1
142027171422081214252126
T:
C:ntruees593ep1
221136642213715822168006
T:
C:ntruees743ep1
470318064704552447062240
T:
r5n11pke0d
772157157735949677526812
T:
mcnie4q1281
868258928709024387337600
T:
C:ntruees787ep1
920283509205592292088743
T:
r5n13pke0d
112193650113017031114104434
T:
mcnie3q1281
132148430132305611132452754
T:
mcnie4q1282
147564333148394918150014471
T:
mcnie3q1282
170899691171044295171258911
T:
mcnie4q1921
173118513173177471173629112
T:
r5n15pke0d
208482769209079175210134232
T:
mcnie3q1921
220866726221103660221333467
T:
mcnie4q2561
229794281230036058230286120
T:
mcnie4q1922
259285296260279399261590962
T:
mcnie3q1922
299075967299651359300845912
T:
mcnie3q2561
304193763304405565304712487
T:
mcnie4q2562
412137357412206273412291232
T:
lotus128
448450660449675255451801277
T:
mcnie3q2562
889760450890164643890442887
T:
lotus192
593368882?1081718481?1744523782?
T:
ronald1024
143198084214329387291434006928
T:
r5n13pke0smallct
162683476016321713221643267430
T:
lotus256
1799920117?2926056522?4102148210?
T:
ronald1536
2708452878?4800159041?7492509301?
T:
ronald2048
9047076536?15762200402?25285002949?
T:
ronald3072
Cycles to encrypt 59 bytes
25%50%75%system
179246180620193245
T:
C:ntruees401ep2
199219200063203321
T:
C:ntruees439ep1
234977236451265565
T:
ronald1024
296598298513301140
T:
C:ntruees593ep1
329788333372361972
T:
ronald1536
415294417381420760
T:
C:ntruees743ep1
467276494313521942
T:
ronald2048
805174807507809886
T:
C:ntruees787ep1
807760829850860687
T:
ronald3072
921009923295928042
T:
mcnie4q1281
123092212331071236224
T:
mcnie4q1282
125397412571481261909
T:
r5nd1pke5d
148648414913791494702
T:
mcnie4q1921
168430916902401696892
T:
r5nd1pke0d
173698817403221743494
T:
mcnie4q1922
180959018149421819414
T:
mcnie4q2561
194373619481011954889
T:
mcnie3q1281
210194421051722112589
T:
mcnie4q2562
251211325143832516524
T:
mcnie3q1282
274595227546512763523
T:
r5nd3pke0d
290436529114422920920
T:
mcnie3q1921
301654430240093030820
T:
r5nd3pke5d
360904336138113620174
T:
mcnie3q1922
381398138194273828142
T:
r5nd5pke0d
391156239198663934263
T:
mcnie3q2561
517490851831695201694
T:
mcnie3q2562
569014356989675711678
T:
r5nd5pke5d
608286960911596100165
T:
lotus128
939555094123989429739
T:
lotus192
134265341345606013474150
T:
lotus256
264314992645461926476579
T:
r5n13pke0smallct
461792454619957346633984
T:
r5n11pke0d
903692789043051690668121
T:
r5n13pke0d
209058313209166593209634372
T:
r5n15pke0d
Cycles to decrypt 59 bytes
25%50%75%system
278530279151282006
T:
C:ntruees401ep2
312042313081315487
T:
C:ntruees439ep1
475021477172479587
T:
C:ntruees593ep1
694968695807698337
T:
C:ntruees743ep1
145224314544921456658
T:
C:ntruees787ep1
187214818766051880681
T:
r5nd1pke5d
238166123879442403372
T:
mcnie4q1281
248583824940702498484
T:
r5nd1pke0d
324058532474623256387
T:
mcnie4q1282
342894934378083442855
T:
mcnie3q1281
379550637994703805282
T:
mcnie4q1921
401004140182024032065
T:
r5nd3pke0d
416313041702084179712
T:
mcnie3q1282
447944144847524489275
T:
mcnie4q1922
456984545761694582184
T:
mcnie4q2561
459702746043644611487
T:
r5nd3pke5d
505472250615415071142
T:
mcnie3q1921
536251253696185374706
T:
mcnie4q2562
554276455483495557661
T:
r5nd5pke0d
586278458750955881217
T:
mcnie3q1922
616236061932466247946
T:
ronald1024
647581964864436495847
T:
mcnie3q2561
740194074101407417773
T:
lotus128
827779282887668329726
T:
mcnie3q2562
874254687532318771589
T:
r5nd5pke5d
118170321182571811835998
T:
lotus192
139941391408461114197286
T:
ronald1536
172755101728728317299768
T:
lotus256
279699712807885128170794
T:
ronald2048
474848684750341847552449
T:
r5n11pke0d
740168777419693574497822
T:
ronald3072
957628769579203296025536
T:
r5n13pke0d
114529951114607107114690782
T:
r5n13pke0smallct
215211317215320663215841222
T:
r5n15pke0d