VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Gracemont (906a4-20); 2022 Intel Core i3-1215U, E cores; 4 x 1600MHz; alder2,1f626960,3300000, supercop-20250307

[Page version: 20250326 01:56:30]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
663856721269031
T:
r5nd1pke5d
937599566199460
T:
r5nd1pke0d
139692141118142926
T:
r5nd3pke5d
136880142714144107
T:
r5nd3pke0d
185056187058188805
T:
r5nd5pke0d
258083260880268985
T:
r5nd5pke5d
497581503337508315
T:
C:ntruees401ep2
593853598933606431
T:
C:ntruees439ep1
860801864413871521
T:
r5n11pke0d
103763710449771052819
T:
C:ntruees593ep1
156010915709171587046
T:
C:ntruees743ep1
173061217340051744600
T:
r5n13pke0d
231052923154692327436
T:
r5n15pke0d
317299932077023559214
T:
ledapkc1464
340995334433863449210
T:
ledapkc1364
348210034893893523702
T:
ledapkc1264
4678435?4726560?6882983?
T:
ledapkc14sl
4103553?5402909?7377937?
T:
ledapkc13sl
569727758443326529988
T:
ledapkc12sl
6595179?7452786?11414583?
T:
ledapkc3464
757365680134088039679
T:
ledapkc3364
832926884620209138239
T:
ledapkc3264
98223671069679310900745
T:
ledapkc33sl
10940820?11932829?14203396?
T:
ledapkc34sl
118149841194664813587961
T:
ledapkc32sl
120765761243558212566803
T:
lotus128
130775731329380713426652
T:
ledapkc5364
153813191583052815995642
T:
ledapkc5464
188299171906793121798432
T:
ledapkc5264
19010944?19510940?27950610?
T:
ledapkc54sl
20764032?21449730?26600432?
T:
ledapkc53sl
269769222703110327095104
T:
C:ntruees787ep1
296836712998857733403558
T:
ledapkc52sl
312415633189962233314875
T:
C:mceliece
317221483223973332850151
T:
lotus192
352752273537142035623203
T:
mcnie4q1281
363076413633049936368581
T:
r5n13pke0smallct
382221153996736040315517
T:
lotus256
477757514801467648413312
T:
mcnie3q1281
603727656044110060521652
T:
mcnie4q1282
681774576865378469137061
T:
mcnie3q1282
47148808?73396353?104327730?
T:
ronald1024
801366128023128780345948
T:
mcnie4q1921
902979609067243091145599
T:
mcnie3q1921
104729638104812673104915677
T:
mcnie4q2561
107784418107894587108027949
T:
mcnie4q1922
121041703121417273121933872
T:
mcnie3q1922
128315407128632731129081398
T:
mcnie3q2561
140355973140504815140642226
T:
mcnie4q2562
206224139206604186207060306
T:
mcnie3q2562
140261987?247358299?395701654?
T:
ronald1536
289795523?486441157?819849921?
T:
ronald2048
1183609381?1935611870?3140248283?
T:
ronald3072
4175519292?6600694212?9500681631?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
377003825640106
T:
ronald1024
386923911839692
T:
C:ntruees401ep2
445474479545095
T:
C:ntruees439ep1
478194838348897
T:
C:mceliece
535215415756366
T:
ronald1536
615076176862125
T:
C:ntruees593ep1
785137884879260
T:
C:ntruees743ep1
771327949680938
T:
ronald2048
105637106259106814
T:
C:ntruees787ep1
126318127247128215
T:
r5nd1pke5d
142746144798147771
T:
ronald3072
162655163300163703
T:
lotus128
185091186581189357
T:
r5nd1pke0d
234261237074240218
T:
ronald4096
249510251687257108
T:
r5nd3pke5d
271986277493286877
T:
r5nd3pke0d
308126308961310142
T:
mcnie4q1281
342190344300347709
T:
lotus256
373286379299382907
T:
r5nd5pke0d
420506421425422544
T:
mcnie4q1282
430284433774439634
T:
r5nd5pke5d
545329546502547492
T:
mcnie4q1921
584273585478586283
T:
ledapkc1264
646971647896649145
T:
mcnie4q1922
652870655429680660
T:
lotus192
667710670073671431
T:
ledapkc1364
686315686904688068
T:
mcnie4q2561
695001696882709160
T:
ledapkc1464
702487704259707813
T:
mcnie3q1281
746909751328769635
T:
ledapkc12sl
757305758776760761
T:
mcnie4q2562
804110820251841083
T:
ledapkc13sl
857279860128864934
T:
mcnie3q1282
944754945578946895
T:
ledapkc14sl
104489810461771048397
T:
r5n11pke0d
106024410619121074561
T:
mcnie3q1921
118355311891621206753
T:
ledapkc3264
125860412607151264373
T:
mcnie3q1922
133500713542951360217
T:
ledapkc3364
140420714181101421482
T:
ledapkc3464
144556214468801449614
T:
mcnie3q2561
144720314765071554270
T:
ledapkc32sl
165016216578251683887
T:
ledapkc33sl
184438018475741860625
T:
mcnie3q2562
195348919980142003528
T:
ledapkc34sl
205204620671412177511
T:
r5n13pke0d
217824321958402285741
T:
ledapkc5264
230388723147152322114
T:
ledapkc5364
257233825792392630149
T:
ledapkc5464
273341727431652769670
T:
r5n15pke0d
278203427838402785915
T:
r5n13pke0smallct
299326829952013043504
T:
ledapkc54sl
302728430348213047498
T:
ledapkc52sl
306667431270163173048
T:
ledapkc53sl
Cycles to decrypt 59 bytes
25%50%75%system
426274281743379
T:
C:ntruees401ep2
487104902349352
T:
C:ntruees439ep1
690976923070145
T:
C:ntruees593ep1
923709290093662
T:
C:ntruees743ep1
134068137939138987
T:
C:ntruees787ep1
179010179908180657
T:
r5nd1pke5d
197795199680201079
T:
lotus128
270417272024276729
T:
r5nd1pke0d
357868365214367184
T:
r5nd3pke5d
408412413046417326
T:
r5nd3pke0d
451671455680458754
T:
lotus256
555281558279572535
T:
r5nd5pke0d
635593638326644334
T:
r5nd5pke5d
668278743116752918
T:
C:mceliece
869396873261897569
T:
lotus192
916301922005929267
T:
mcnie4q1281
110708011149141120364
T:
ronald1024
114259211445831147209
T:
r5n11pke0d
126553812726501280416
T:
mcnie4q1282
127499112869441301925
T:
mcnie3q1281
156988315764621585701
T:
mcnie4q1921
158707015929671604914
T:
mcnie3q1282
186885218747211883518
T:
mcnie4q1922
190184519120561922636
T:
mcnie4q2561
193174319424421964826
T:
mcnie3q1921
221617222229622231122
T:
mcnie4q2562
227625222963272307141
T:
mcnie3q1922
247482325056032532944
T:
r5n13pke0d
250769025198542538290
T:
mcnie3q2561
267180826867452694384
T:
ledapkc1264
297715229947373009514
T:
ledapkc1364
320459832173513249901
T:
r5n15pke0d
325353332556143277811
T:
ledapkc1464
326757932785883287110
T:
ronald1536
328984033016883328588
T:
mcnie3q2562
377741937877343816848
T:
ledapkc12sl
377365337975823810523
T:
ledapkc13sl
419027142036664208495
T:
ledapkc14sl
598930760007456016828
T:
ronald2048
807171180800748116733
T:
ledapkc3264
833618383645128416781
T:
ledapkc3464
865084187136738774898
T:
ledapkc3364
107742661080265810825442
T:
r5n13pke0smallct
103855831101588411063287
T:
ledapkc32sl
126290671291167613121103
T:
ledapkc33sl
139616851402975014152496
T:
ledapkc34sl
175028451752968217568341
T:
ronald3072
178834651798937518048366
T:
ledapkc5264
204568962107347622021086
T:
ledapkc5364
259270812612131226401715
T:
ledapkc52sl
240872022624944426627996
T:
ledapkc5464
278312373023084730545584
T:
ledapkc53sl
281558563333533433621149
T:
ledapkc54sl
388538283889681938992542
T:
ronald4096