VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; K10 45nm (100f63); 2010 AMD Athlon II Neo K125; 1 x 1700MHz; h3neo, supercop-20251222

[Page version: 20260315 18:26:08]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: old (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
120740512118491218100
T:
C:ntruees401ep2
141935214247571429916
T:
C:ntruees439ep1
240414924121772418482
T:
C:ntruees593ep1
365531136666413675390
T:
C:ntruees743ep1
460117624609858846196018
T:
mcnie4q1281
432872064615851050082565
T:
C:mceliece
551193055530368655562273
T:
lotus128
613826056174511662373232
T:
mcnie3q1281
787748267888229279025096
T:
mcnie4q1282
879687028849921589331599
T:
mcnie3q1282
941588779461805094956446
T:
C:ntruees787ep1
100226040100366862100512139
T:
mcnie4q1921
105707116106088310106794622
T:
lotus192
112462112112717184113367833
T:
mcnie3q1921
68623731?115791032?214371897?
T:
rsa2048
124190856124342532124502420
T:
mcnie4q2561
90270102?126775899?200636214?
T:
ronald1024
134890398135050549135231588
T:
mcnie4q1922
91010456?150098069?228522496?
T:
cargocult2048
152280425152630324153462001
T:
mcnie3q2561
152606727153097713153812174
T:
mcnie3q1922
173404973173569382173748356
T:
mcnie4q2562
183750897184104388187519539
T:
lotus256
255796832256653611257602238
T:
mcnie3q2562
356514459?509316990?699477952?
T:
ronald1536
817814496?1175772255?1755779504?
T:
ronald2048
2575371729?3923555494?6189186866?
T:
ronald3072
6677643036?10425655679?15310997189?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
486995193057074
T:
rsa2048
493805363857250
T:
cargocult2048
587165966460485
T:
C:mceliece
639926469671280
T:
ronald1024
682976874269448
T:
C:ntruees401ep2
763637708077877
T:
C:ntruees439ep1
861328897095746
T:
ronald1536
115148116047117036
T:
C:ntruees593ep1
115635121970130607
T:
ronald2048
152993154114155289
T:
C:ntruees743ep1
195533199594207147
T:
ronald3072
250043250910252160
T:
C:ntruees787ep1
302464309542318779
T:
ronald4096
509079512084513333
T:
mcnie4q1281
686692691237692665
T:
mcnie4q1282
761011765881802242
T:
lotus128
819668821103822303
T:
mcnie4q1921
975452976664979944
T:
mcnie4q2561
975670980469985920
T:
mcnie4q1922
102373810252901027161
T:
mcnie3q1281
117197411747271177326
T:
mcnie4q2562
118418211915491197052
T:
lotus192
127530712797861283439
T:
mcnie3q1282
154455915460531547592
T:
mcnie3q1921
172734317323861737013
T:
lotus256
184969318531921858982
T:
mcnie3q1922
199824219993782000700
T:
mcnie3q2561
264873126529312656980
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
99255100061100661
T:
C:ntruees401ep2
111095111576112249
T:
C:ntruees439ep1
169215170312171577
T:
C:ntruees593ep1
234417237626239173
T:
C:ntruees743ep1
429014431799433456
T:
C:ntruees787ep1
935828947318966844
T:
lotus128
100588710245891038467
T:
C:mceliece
123857812424391248682
T:
mcnie4q1281
152477315397141551997
T:
lotus192
169646216995811705519
T:
mcnie3q1281
169128117006881707207
T:
mcnie4q1282
175536517801571799378
T:
ronald1024
205579320678612081013
T:
mcnie4q1921
210430821123742121004
T:
mcnie3q1282
224215122482182254862
T:
lotus256
237984023892122400728
T:
mcnie4q1922
242185524341252444834
T:
mcnie4q2561
250589425197572539650
T:
mcnie3q1921
284278428537642865325
T:
mcnie4q2562
302781630386803050977
T:
mcnie3q1922
315557231661503176720
T:
mcnie3q2561
318528631894173198734
T:
rsa2048
318082631972463198058
T:
cargocult2048
423057042391094263066
T:
mcnie3q2562
451270045417704574551
T:
ronald1536
762497776535447684180
T:
ronald2048
204929402054361520605158
T:
ronald3072
425314644260750942666022
T:
ronald4096