VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Golden Cove (90675-00); 2022 Intel Core i3-12100; 4 x 3300MHz; alder, supercop-20251222

[Page version: 20260221 06:44:50]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
335411338366340775
T:
C:ntruees401ep2
414022417062420096
T:
C:ntruees439ep1
678996682079686170
T:
C:ntruees593ep1
99739010010051007058
T:
C:ntruees743ep1
614779261566626188284
T:
lotus128
125402831254573112558277
T:
lotus192
204222912044823420656960
T:
lotus256
214280202146773721533377
T:
mcnie4q1281
222557152232422222394104
T:
C:ntruees787ep1
297277643018989030850360
T:
mcnie3q1281
300020063052097831515822
T:
C:mceliece
369427333809170638990135
T:
mcnie4q1282
418443684284867243484332
T:
mcnie3q1282
515063285211348453072747
T:
mcnie4q1921
39930632?52333265?76026818?
T:
ronald1024
529631005323611653645115
T:
mcnie3q1921
631375786370924964529529
T:
mcnie4q2561
42653431?68090219?106387322?
T:
rsa2048
683583946958407170684582
T:
mcnie4q1922
717218047209605772598935
T:
mcnie3q1922
48526323?72291030?113447432?
T:
cargocult2048
794121138029896081835998
T:
mcnie3q2561
857674588675593387640681
T:
mcnie4q2562
124447261124832131125539085
T:
mcnie3q2562
165194872?221238720?287690198?
T:
ronald1536
269558417?419341272?670645386?
T:
ronald2048
858679250?1123369385?1825975232?
T:
ronald3072
2150178089?3158099902?5024976380?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
149101528215975
T:
cargocult2048
150801568316346
T:
rsa2048
257242609726693
T:
ronald1024
292242958229972
T:
C:ntruees401ep2
338563414935024
T:
ronald1536
389543924339724
T:
C:ntruees439ep1
447384588646964
T:
ronald2048
461854673147438
T:
C:mceliece
547585528755894
T:
C:ntruees593ep1
697797032270874
T:
C:ntruees743ep1
764327726578481
T:
ronald3072
853848592686600
T:
C:ntruees787ep1
932869365794127
T:
lotus128
120738121898123217
T:
ronald4096
134801135296135849
T:
lotus192
188659189002189620
T:
lotus256
221159221813222969
T:
mcnie4q1281
339361341140342746
T:
mcnie4q1282
381902383691391999
T:
mcnie4q1921
447559450700461150
T:
mcnie4q1922
470345476714481481
T:
mcnie4q2561
481125486195509987
T:
mcnie3q1281
539449547101562262
T:
mcnie4q2562
590842628366632497
T:
mcnie3q1282
699056701246703200
T:
mcnie3q1921
832555834114837746
T:
mcnie3q1922
978633988896992498
T:
mcnie3q2561
123125612342191237721
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
294452970830287
T:
C:ntruees401ep2
410514156941868
T:
C:ntruees439ep1
575745801058983
T:
C:ntruees593ep1
788997946580270
T:
C:ntruees743ep1
102416102826112912
T:
C:ntruees787ep1
109031109130109249
T:
lotus128
163704164121164707
T:
lotus192
233428233701234071
T:
lotus256
621334627131641118
T:
mcnie4q1281
614480629328636321
T:
C:mceliece
665663671497677284
T:
ronald1024
904121919724949125
T:
mcnie4q1282
939682947802970131
T:
mcnie3q1281
116810511800151209111
T:
mcnie3q1282
117623911925331215758
T:
mcnie4q1921
139782514075291435862
T:
mcnie4q1922
144391314502381457857
T:
mcnie3q1921
143791614559891481263
T:
mcnie4q2561
158695715902221593824
T:
cargocult2048
158942215918461595860
T:
rsa2048
169597217051341722919
T:
mcnie4q2562
171807417257321732344
T:
mcnie3q1922
173634517459511752618
T:
ronald1536
189778119100471920260
T:
mcnie3q2561
247190924801182528682
T:
mcnie3q2562
282689628353392844033
T:
ronald2048
759401776095557622211
T:
ronald3072
162796421630094316322284
T:
ronald4096