VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: armeabi; Cortex-A17 (410fc0d1); 2014 Rockchip RK3288; 4 x 1800MHz; tinker, supercop-20241022

[Page version: 20260221 06:44:50]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
254142255243256898
T:
r5nd1pke0d
312576313811316482
T:
r5nd1pke5d
395275396537398789
T:
r5nd3pke0d
398743400459402321
T:
r5nd3pke5d
540922542936544918
T:
r5nd5pke0d
708253710979713638
T:
r5nd5pke5d
202339952024032920244432
T:
r5n11pke0d
393790993960161439683765
T:
r5n13pke0d
460613664618943146309768
T:
lotus128
743096737439382774409653
T:
r5n15pke0d
744913137457039474720122
T:
mcnie4q1281
963874769695069797374086
T:
lotus192
100647606101014428101368279
T:
mcnie3q1281
127766531127943370128127658
T:
mcnie4q1282
144326536145147403146551295
T:
mcnie3q1282
165111067165311981165552683
T:
mcnie4q1921
181384802181526066181708240
T:
lotus256
187263362187739394188431348
T:
mcnie3q1921
210813148211053643211215245
T:
mcnie4q2561
222321131222572627222836734
T:
mcnie4q1922
253984660254566164255464067
T:
mcnie3q1922
264814599265250813266047658
T:
mcnie3q2561
290398534290707532290969111
T:
mcnie4q2562
262354685?379757943?513182123?
T:
ronald1024
433958217435025570436059835
T:
mcnie3q2562
297147408?521666230?879547155?
T:
rsa2048
375013806?602344799?855737536?
T:
cargocult2048
710629578710810189710929474
T:
r5n13pke0smallct
1119688567?1780723327?3038399414?
T:
ronald2048
1672711812?2661870297?3942121695?
T:
ronald3072
2650538702?3032862407?3451665416?
T:
pqrsa15
3578928027?5709444698?7625709064?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
97059102523106864
T:
rsa2048
97638103046107079
T:
cargocult2048
129538130561138877
T:
ronald1024
264043272121279501
T:
ronald2048
461591468070476038
T:
ronald3072
491747493335495504
T:
r5nd1pke0d
627009629261631828
T:
r5nd1pke5d
652529654612657111
T:
r5nd3pke5d
700069701295702967
T:
mcnie4q1281
726985735262745315
T:
ronald4096
757397759397762509
T:
r5nd3pke0d
790560792824796241
T:
lotus128
943849945145946533
T:
mcnie4q1282
103418910361351039039
T:
r5nd5pke0d
111367911160091119534
T:
r5nd5pke5d
115215211530511155553
T:
mcnie4q1921
118546411878951191140
T:
lotus192
135836013607541362198
T:
mcnie4q1922
141530514162151420137
T:
mcnie4q2561
146511214685121470521
T:
mcnie3q1281
165058116534901654730
T:
mcnie4q2562
167179316786281683254
T:
lotus256
180572418124081814422
T:
mcnie3q1282
220706022108652213771
T:
mcnie3q1921
265769426614722664518
T:
mcnie3q1922
300640730131703019476
T:
mcnie3q2561
383297238465283854873
T:
mcnie3q2562
130158321302137113031150
T:
r5n13pke0smallct
193344761935756719389827
T:
r5n11pke0d
347707693477987034794574
T:
r5n13pke0d
605847686067801560728358
T:
r5n15pke0d
734001967344884373504344
T:
pqrsa15
Cycles to decrypt 59 bytes
25%50%75%system
704130705118708018
T:
r5nd1pke0d
893146896262898218
T:
r5nd3pke5d
916347917546919890
T:
r5nd1pke5d
9968579987981001464
T:
lotus128
107923410808751083112
T:
r5nd3pke0d
147751714863851489975
T:
r5nd5pke0d
155263315560671558262
T:
r5nd5pke5d
157174815748261596322
T:
lotus192
183776118420731848290
T:
mcnie4q1281
226228122690752274122
T:
lotus256
242186524253812428914
T:
mcnie3q1281
249750925000212502200
T:
mcnie4q1282
296328729666522968873
T:
mcnie4q1921
304336130474063052977
T:
mcnie3q1282
349349535096723538614
T:
ronald1024
351712035203513529428
T:
mcnie4q1922
358239235992903605884
T:
mcnie3q1921
363197536426783660562
T:
mcnie4q2561
426837942760034281891
T:
mcnie4q2562
432928443352874340203
T:
mcnie3q1922
474036747450944748686
T:
mcnie3q2561
619839462057456273144
T:
mcnie3q2562
106764431068475510709964
T:
cargocult2048
106744911069855510715334
T:
rsa2048
151740501522622715285577
T:
ronald2048
199796201999345320025911
T:
r5n11pke0d
370275943703770837048832
T:
r5n13pke0d
381584823822488238308346
T:
ronald3072
488742674894409749007344
T:
r5n13pke0smallct
634406016349609863541582
T:
r5n15pke0d
767276537689192477104087
T:
ronald4096
570000504570853295571812084
T:
pqrsa15