Figure 6: Time consumed to generate a key of different sizes by CKMS used by 3 different algorithms.