VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Gracemont (906a4-20); 2022 Intel Core i3-1215U, E cores; 4 x 1600MHz; alder2,1f626960,3300000, supercop-20240909

[Page version: 20240912 11:45:58]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
729237361076382
T:
r5nd1pke5d
97408101374102495
T:
r5nd1pke0d
145436148054149937
T:
r5nd3pke0d
151645153861155544
T:
r5nd3pke5d
179572181195191173
T:
r5nd5pke0d
268200270390273457
T:
r5nd5pke5d
891630901285907119
T:
r5n11pke0d
188353018925781911751
T:
r5n13pke0d
246581724714132477877
T:
r5n15pke0d
280189528074763291860
T:
ledapkc1464
341968336789504019224
T:
ledapkc1364
358916437320913754680
T:
ledapkc1264
4026709?4294516?7247913?
T:
ledapkc13sl
4696643?4722249?6902797?
T:
ledapkc14sl
580754259020486740709
T:
ledapkc12sl
7375798?7467823?11465705?
T:
ledapkc3464
753696881321278837681
T:
ledapkc3364
810725381653738410261
T:
ledapkc3264
106537031087272911151493
T:
ledapkc33sl
105077751110769111967810
T:
ledapkc34sl
117981281184631413471796
T:
ledapkc32sl
125510001425762414876203
T:
ledapkc5464
130530641459301314831363
T:
ledapkc5364
170355101759927918324187
T:
lotus128
183856921908377520794340
T:
ledapkc5264
17649813?19214752?25011573?
T:
ledapkc54sl
20517034?20988895?26075132?
T:
ledapkc53sl
292283612957741032377377
T:
ledapkc52sl
313626253205184533656413
T:
C:mceliece
354327723561474335715906
T:
mcnie4q1281
361309283727296237901971
T:
lotus192
385255783861886938654739
T:
r5n13pke0smallct
477272434796436948559569
T:
mcnie3q1281
603804826043193360534413
T:
mcnie4q1282
629271086722194069785385
T:
lotus256
679932196843675969020909
T:
mcnie3q1282
40280442?77753471?114859312?
T:
ronald1024
801118108023551380354894
T:
mcnie4q1921
900773709037805090890689
T:
mcnie3q1921
104682440104817867104954354
T:
mcnie4q2561
107800888107996833108107825
T:
mcnie4q1922
121047532121344663121975154
T:
mcnie3q1922
130728101130990845131490895
T:
mcnie3q2561
140338090140470607140642415
T:
mcnie4q2562
206193082206493604207256259
T:
mcnie3q2562
123243223?226828311?369118345?
T:
ronald1536
302663428?563066671?824472131?
T:
ronald2048
1067775974?1807980361?2982834340?
T:
ronald3072
3524726558?5501243160?7659689214?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
370283781839465
T:
ronald1024
485494952650050
T:
C:mceliece
541135513757244
T:
ronald1536
776307939481529
T:
ronald2048
134210134933135674
T:
r5nd1pke5d
142670145733148314
T:
ronald3072
181111182561183701
T:
r5nd1pke0d
233742236284239126
T:
ronald4096
267543269682273329
T:
r5nd3pke5d
277859279407282043
T:
r5nd3pke0d
307372308283309123
T:
mcnie4q1281
370143373739379715
T:
r5nd5pke0d
312099?410230?457224?
T:
lotus128
420935422235423142
T:
mcnie4q1282
449321452296456040
T:
r5nd5pke5d
544131545322546845
T:
mcnie4q1921
620710622218625897
T:
ledapkc1264
644661647649649595
T:
mcnie4q1922
685363686023686947
T:
mcnie4q2561
702989705580708565
T:
mcnie3q1281
727530757413767709
T:
ledapkc1364
759973762397765998
T:
mcnie4q2562
786718787926815135
T:
ledapkc12sl
800796801412801912
T:
ledapkc1464
671933?821998?841866?
T:
lotus192
855145857191859047
T:
mcnie3q1282
856874857350857837
T:
ledapkc13sl
774619?970933?1549183?
T:
lotus256
101590410255241029689
T:
ledapkc14sl
106015710620751064106
T:
mcnie3q1921
107603810790351080393
T:
r5n11pke0d
125544312576901260761
T:
mcnie3q1922
126095812702731290620
T:
ledapkc3264
144427814592401462771
T:
ledapkc3364
148431614868821490117
T:
mcnie3q2561
153655815476851553206
T:
ledapkc3464
155553115646171580477
T:
ledapkc32sl
178495018231381889283
T:
ledapkc33sl
184937318508911852793
T:
mcnie3q2562
214127221629482171677
T:
ledapkc34sl
216537821981172210147
T:
r5n13pke0d
230579623324292339784
T:
ledapkc5264
246712425552782597198
T:
ledapkc5364
282481728374442854063
T:
r5n13pke0smallct
284546328556342925800
T:
ledapkc5464
289046729025732928444
T:
r5n15pke0d
318358132692933315775
T:
ledapkc52sl
333992933700183417972
T:
ledapkc53sl
339817334102123424404
T:
ledapkc54sl
Cycles to decrypt 59 bytes
25%50%75%system
196571197390198548
T:
r5nd1pke5d
270646273210274835
T:
r5nd1pke0d
395311396781398349
T:
r5nd3pke5d
414595418514420081
T:
r5nd3pke0d
501341542061557547
T:
lotus128
551164553026578458
T:
r5nd5pke0d
661101665447668367
T:
r5nd5pke5d
719761746147747234
T:
C:mceliece
924527929574936259
T:
mcnie4q1281
810852?1081564?1261010?
T:
lotus192
110983911183151126132
T:
ronald1024
119206511948601195926
T:
r5n11pke0d
126627412716531277036
T:
mcnie4q1282
128350812907901297849
T:
mcnie3q1281
1131202?1373281?2129368?
T:
lotus256
156370015893211598755
T:
mcnie4q1921
158917816008621611475
T:
mcnie3q1282
186055518676781878910
T:
mcnie4q1922
190999419172111924766
T:
mcnie4q2561
192975719397031948936
T:
mcnie3q1921
223483722452552271005
T:
mcnie4q2562
229102523056332316547
T:
mcnie3q1922
258970126017752610672
T:
mcnie3q2561
271775527420082822643
T:
r5n13pke0d
274842727621672788801
T:
ledapkc1264
305904330665823069005
T:
ledapkc1364
327396232854713294246
T:
ronald1536
328165433028323308396
T:
mcnie3q2562
331260533186763346240
T:
ledapkc1464
347665634838413500969
T:
r5n15pke0d
382480938419883846017
T:
ledapkc12sl
382312738741853917175
T:
ledapkc13sl
426144342870974297853
T:
ledapkc14sl
598315059976626010153
T:
ronald2048
817968481871268208390
T:
ledapkc3264
848551085873768637939
T:
ledapkc3464
882440488725498897261
T:
ledapkc3364
104775421099929111086284
T:
ledapkc32sl
130219301303201313082176
T:
r5n13pke0smallct
126919981303713813355732
T:
ledapkc33sl
141905891426536614370490
T:
ledapkc34sl
175233021755052817574879
T:
ronald3072
181224801816785918637131
T:
ledapkc5264
208196122118017322671068
T:
ledapkc5364
243034742628442726825395
T:
ledapkc5464
261226572669302328650632
T:
ledapkc52sl
280181742870195130659833
T:
ledapkc53sl
284956083298262133961401
T:
ledapkc54sl
388592523890306038939884
T:
ronald4096