VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; K10 45nm (100f63); 2010 AMD Athlon II Neo K125; 1 x 1700MHz; h3neo, supercop-20251114

[Page version: 20260221 06:44:50]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: old (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
120779612112321217617
T:
C:ntruees401ep2
141957514240601429398
T:
C:ntruees439ep1
240483924121252418072
T:
C:ntruees593ep1
365625636668573674587
T:
C:ntruees743ep1
460080654609774646180770
T:
mcnie4q1281
432251714637465849371105
T:
C:mceliece
551084805529312155515627
T:
lotus128
613516796172531362272936
T:
mcnie3q1281
787714917888112179035282
T:
mcnie4q1282
879534008846082789164258
T:
mcnie3q1282
941365449460851494925947
T:
C:ntruees787ep1
100225519100365828100497912
T:
mcnie4q1921
105707298106035731106771827
T:
lotus192
68231249?108401215?204853689?
T:
rsa2048
112454134112720571113337852
T:
mcnie3q1921
90759339?116340265?197526225?
T:
ronald1024
124214711124338190124487224
T:
mcnie4q2561
134866250135060129135210260
T:
mcnie4q1922
91658748?151613932?230357798?
T:
cargocult2048
152312238152635410153371744
T:
mcnie3q2561
152669794153056997153801063
T:
mcnie3q1922
173439611173559124173733177
T:
mcnie4q2562
183757232184045919187708564
T:
lotus256
255759337256624285257542903
T:
mcnie3q2562
331525523?509913441?718850934?
T:
ronald1536
819772758?1177913801?1723667216?
T:
ronald2048
2533256854?3782268138?5980581499?
T:
ronald3072
6669534760?10549734962?14910489395?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
487295215157399
T:
rsa2048
493785467757490
T:
cargocult2048
587625969960377
T:
C:mceliece
640946443472135
T:
ronald1024
683296867669406
T:
C:ntruees401ep2
763367706177764
T:
C:ntruees439ep1
860338739494875
T:
ronald1536
115080116117116913
T:
C:ntruees593ep1
115519122668131697
T:
ronald2048
153085154095155221
T:
C:ntruees743ep1
197767199684207332
T:
ronald3072
250083250892252131
T:
C:ntruees787ep1
304582311984320711
T:
ronald4096
509983512116513048
T:
mcnie4q1281
685371691160692629
T:
mcnie4q1282
760637765755805332
T:
lotus128
819558821057822190
T:
mcnie4q1921
975509976530979939
T:
mcnie4q2561
975113980508986852
T:
mcnie4q1922
102372710252611026638
T:
mcnie3q1281
117195111753611177102
T:
mcnie4q2562
118293511916481197489
T:
lotus192
127496212793831283016
T:
mcnie3q1282
154502915460321547211
T:
mcnie3q1921
172743817322391737240
T:
lotus256
184982618513671858781
T:
mcnie3q1922
199826219994362000551
T:
mcnie3q2561
264837226532372656306
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
9913799870100594
T:
C:ntruees401ep2
111193111479112169
T:
C:ntruees439ep1
169128170123171354
T:
C:ntruees593ep1
233582237718239024
T:
C:ntruees743ep1
428260431755433407
T:
C:ntruees787ep1
934717947945971011
T:
lotus128
100197710244921040044
T:
C:mceliece
123884012422241248083
T:
mcnie4q1281
152467615373541551597
T:
lotus192
169673816993111705309
T:
mcnie3q1281
169121617003831706488
T:
mcnie4q1282
175490317789591796927
T:
ronald1024
205670120686892080247
T:
mcnie4q1921
210502421127472120647
T:
mcnie3q1282
224315722481162254447
T:
lotus256
238054723897372399582
T:
mcnie4q1922
242177924348192443311
T:
mcnie4q2561
250733125205482539510
T:
mcnie3q1921
284348528545922864437
T:
mcnie4q2562
302829830392193051471
T:
mcnie3q1922
315620731664303175824
T:
mcnie3q2561
318369431884283198714
T:
rsa2048
317698731973943197976
T:
cargocult2048
423064142377734264749
T:
mcnie3q2562
451433545398744571924
T:
ronald1536
762632376545667683322
T:
ronald2048
204903552053902420600186
T:
ronald3072
425373624260387242660870
T:
ronald4096