VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: armeabi; Cortex-A7 (410fc075); 2016 Broadcom BCM2836; 4 x 900MHz; berry2, supercop-20240909

[Page version: 20241120 00:41:14]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
589841592945600504
T:
r5nd1pke5d
863265870093876936
T:
r5nd1pke0d
141957914270541435662
T:
r5nd3pke0d
143524914414421450263
T:
r5nd3pke5d
198591519957942004709
T:
r5nd5pke0d
271681827249162738654
T:
r5nd5pke5d
466407394664923346657299
T:
r5n11pke0d
771900447729771377428442
T:
mcnie4q1281
905709789060181190647909
T:
r5n13pke0d
112146037112693118114064327
T:
mcnie3q1281
132162622132387310132693344
T:
mcnie4q1282
147376812148283053149448329
T:
mcnie3q1282
170938333171151569171389816
T:
mcnie4q1921
171542118171611979172663031
T:
r5n15pke0d
208661800209342299210996629
T:
mcnie3q1921
220929849221156071221355607
T:
mcnie4q2561
229837968230123607230325477
T:
mcnie4q1922
259167146260084924261310516
T:
mcnie3q1922
299123609300130224301076243
T:
mcnie3q2561
304166597304548797304872704
T:
mcnie4q2562
412198109412334514413670508
T:
lotus128
448407838449335976451283563
T:
mcnie3q2562
888409765888556902894699143
T:
lotus192
549216729?1022021529?1684086149?
T:
ronald1024
140718519614074795811413475506
T:
r5n13pke0smallct
163401882316349452041642502947
T:
lotus256
1576678751?2645103627?4448468254?
T:
ronald1536
2893156745?5738472139?10111969087?
T:
ronald2048
8026025675?12839208229?20440742171?
T:
ronald3072
Cycles to encrypt 59 bytes
25%50%75%system
235676238547266244
T:
ronald1024
331395341522364057
T:
ronald1536
465244494500525244
T:
ronald2048
823514834826862737
T:
ronald3072
921789925417931684
T:
mcnie4q1281
121409012175611222144
T:
r5nd1pke5d
122884512314121236285
T:
mcnie4q1282
148856414941201498635
T:
mcnie4q1921
163326316373841643026
T:
r5nd1pke0d
173512517397791746009
T:
mcnie4q1922
181012518150351821084
T:
mcnie4q2561
194330519480601953697
T:
mcnie3q1281
210420921105082116228
T:
mcnie4q2562
251158725142642517488
T:
mcnie3q1282
267271126796562686335
T:
r5nd3pke0d
289511428987542905848
T:
mcnie3q1921
293032529341122939367
T:
r5nd3pke5d
361814236218683626931
T:
mcnie3q1922
374302737489403752778
T:
r5nd5pke0d
392224939333583939091
T:
mcnie3q2561
517320851794035185231
T:
mcnie3q2562
554623055550155563440
T:
r5nd5pke5d
608240760966456102038
T:
lotus128
939499294048559418649
T:
lotus192
134096031344023513467328
T:
lotus256
258534802586858025888525
T:
r5n13pke0smallct
457885504579731845803104
T:
r5n11pke0d
887770448879309688819697
T:
r5n13pke0d
203790079203876768203939341
T:
r5n15pke0d
Cycles to decrypt 59 bytes
25%50%75%system
180221418081911813651
T:
r5nd1pke5d
237823423899842397485
T:
r5nd1pke0d
238314823920862402967
T:
mcnie4q1281
324204032477113254064
T:
mcnie4q1282
342855134406193448276
T:
mcnie3q1281
380261538070853809807
T:
mcnie4q1921
388176738864193893437
T:
r5nd3pke0d
416565941752064184822
T:
mcnie3q1282
441913844239464435104
T:
r5nd3pke5d
446948544766684491952
T:
mcnie4q1922
457619845841354591525
T:
mcnie4q2561
505109450599205070562
T:
mcnie3q1921
535174853623265369566
T:
mcnie4q2562
540975654121865414418
T:
r5nd5pke0d
587642358808635889698
T:
mcnie3q1922
616394562160346261928
T:
ronald1024
647980764970196509042
T:
mcnie3q2561
740711174167447422267
T:
lotus128
827317882929168366714
T:
mcnie3q2562
848402284885678499519
T:
r5nd5pke5d
118296651183837811848552
T:
lotus192
140082641408060514164637
T:
ronald1536
172912921730075617316439
T:
lotus256
279976302807385128182021
T:
ronald2048
468637904687847146887352
T:
r5n11pke0d
740054647419831774387608
T:
ronald3072
910151979105134791068863
T:
r5n13pke0smallct
928882159291285492971023
T:
r5n13pke0d
208772408208826479208898838
T:
r5n15pke0d