VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: armeabi; Cortex-A7 (410fc075); 2016 Broadcom BCM2836; 4 x 900MHz; berry2, supercop-20250415

[Page version: 20250615 19:27:01]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
627174630977635757
T:
r5nd1pke5d
913808918850926312
T:
r5nd1pke0d
149060914949091503730
T:
r5nd3pke0d
151890215256631535290
T:
r5nd3pke5d
205500020626632071146
T:
r5nd5pke0d
285046428603822874762
T:
r5nd5pke5d
667397466862326698550
T:
C:ntruees401ep2
792096779367227955334
T:
C:ntruees439ep1
142027171422081214252126
T:
C:ntruees593ep1
221136642213715822168006
T:
C:ntruees743ep1
470318064704552447062240
T:
r5n11pke0d
772157157735949677526812
T:
mcnie4q1281
868258928709024387337600
T:
C:ntruees787ep1
920283509205592292088743
T:
r5n13pke0d
112193650113017031114104434
T:
mcnie3q1281
132148430132305611132452754
T:
mcnie4q1282
147564333148394918150014471
T:
mcnie3q1282
170899691171044295171258911
T:
mcnie4q1921
173118513173177471173629112
T:
r5n15pke0d
208482769209079175210134232
T:
mcnie3q1921
220866726221103660221333467
T:
mcnie4q2561
229794281230036058230286120
T:
mcnie4q1922
259285296260279399261590962
T:
mcnie3q1922
299075967299651359300845912
T:
mcnie3q2561
304193763304405565304712487
T:
mcnie4q2562
412137357412206273412291232
T:
lotus128
448450660449675255451801277
T:
mcnie3q2562
889760450890164643890442887
T:
lotus192
593368882?1081718481?1744523782?
T:
ronald1024
143198084214329387291434006928
T:
r5n13pke0smallct
162683476016321713221643267430
T:
lotus256
1799920117?2926056522?4102148210?
T:
ronald1536
2708452878?4800159041?7492509301?
T:
ronald2048
9047076536?15762200402?25285002949?
T:
ronald3072
Cycles to encrypt 59 bytes
25%50%75%system
179246180620193245
T:
C:ntruees401ep2
199219200063203321
T:
C:ntruees439ep1
234977236451265565
T:
ronald1024
296598298513301140
T:
C:ntruees593ep1
329788333372361972
T:
ronald1536
415294417381420760
T:
C:ntruees743ep1
467276494313521942
T:
ronald2048
805174807507809886
T:
C:ntruees787ep1
807760829850860687
T:
ronald3072
921009923295928042
T:
mcnie4q1281
123092212331071236224
T:
mcnie4q1282
125397412571481261909
T:
r5nd1pke5d
148648414913791494702
T:
mcnie4q1921
168430916902401696892
T:
r5nd1pke0d
173698817403221743494
T:
mcnie4q1922
180959018149421819414
T:
mcnie4q2561
194373619481011954889
T:
mcnie3q1281
210194421051722112589
T:
mcnie4q2562
251211325143832516524
T:
mcnie3q1282
274595227546512763523
T:
r5nd3pke0d
290436529114422920920
T:
mcnie3q1921
301654430240093030820
T:
r5nd3pke5d
360904336138113620174
T:
mcnie3q1922
381398138194273828142
T:
r5nd5pke0d
391156239198663934263
T:
mcnie3q2561
517490851831695201694
T:
mcnie3q2562
569014356989675711678
T:
r5nd5pke5d
608286960911596100165
T:
lotus128
939555094123989429739
T:
lotus192
134265341345606013474150
T:
lotus256
264314992645461926476579
T:
r5n13pke0smallct
461792454619957346633984
T:
r5n11pke0d
903692789043051690668121
T:
r5n13pke0d
209058313209166593209634372
T:
r5n15pke0d
Cycles to decrypt 59 bytes
25%50%75%system
278530279151282006
T:
C:ntruees401ep2
312042313081315487
T:
C:ntruees439ep1
475021477172479587
T:
C:ntruees593ep1
694968695807698337
T:
C:ntruees743ep1
145224314544921456658
T:
C:ntruees787ep1
187214818766051880681
T:
r5nd1pke5d
238166123879442403372
T:
mcnie4q1281
248583824940702498484
T:
r5nd1pke0d
324058532474623256387
T:
mcnie4q1282
342894934378083442855
T:
mcnie3q1281
379550637994703805282
T:
mcnie4q1921
401004140182024032065
T:
r5nd3pke0d
416313041702084179712
T:
mcnie3q1282
447944144847524489275
T:
mcnie4q1922
456984545761694582184
T:
mcnie4q2561
459702746043644611487
T:
r5nd3pke5d
505472250615415071142
T:
mcnie3q1921
536251253696185374706
T:
mcnie4q2562
554276455483495557661
T:
r5nd5pke0d
586278458750955881217
T:
mcnie3q1922
616236061932466247946
T:
ronald1024
647581964864436495847
T:
mcnie3q2561
740194074101407417773
T:
lotus128
827779282887668329726
T:
mcnie3q2562
874254687532318771589
T:
r5nd5pke5d
118170321182571811835998
T:
lotus192
139941391408461114197286
T:
ronald1536
172755101728728317299768
T:
lotus256
279699712807885128170794
T:
ronald2048
474848684750341847552449
T:
r5n11pke0d
740168777419693574497822
T:
ronald3072
957628769579203296025536
T:
r5n13pke0d
114529951114607107114690782
T:
r5n13pke0smallct
215211317215320663215841222
T:
r5n15pke0d