VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Bonnell (106ca); 2011 Intel Atom N435; 1 x 1330MHz; h4atom, supercop-20250922

[Page version: 20251123 20:13:51]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: old (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
126652412819611293627
T:
C:ntruees401ep2
146852114787231488813
T:
C:ntruees439ep1
250407325154902532649
T:
C:ntruees593ep1
373656537518103770466
T:
C:ntruees743ep1
783558367847875178639316
T:
mcnie4q1281
852848998992408798732763
T:
C:mceliece
104689442105299502106419632
T:
mcnie3q1281
109698492109932446112872592
T:
lotus128
134417261134611130134863390
T:
mcnie4q1282
150623647151518848153066284
T:
mcnie3q1282
167690999168575652169222297
T:
C:ntruees787ep1
173699574174365234187678505
T:
mcnie4q1921
194805346196165553200169798
T:
mcnie3q1921
228673963229220352229455784
T:
lotus192
233529373233867062234112181
T:
mcnie4q1922
221740058239263699266003727
T:
mcnie4q2561
263978676264681813266502596
T:
mcnie3q1922
274114232274987338275866361
T:
mcnie3q2561
304806707305147805305642457
T:
mcnie4q2562
405084879406269035406627157
T:
lotus256
450013329450903807452574644
T:
mcnie3q2562
364851187?581708912?789894503?
T:
ronald1024
431582345?881792013?1426697884?
T:
cargocult2048
644540893?938397630?1530622076?
T:
rsa2048
1661348730?2317471183?3393853883?
T:
ronald1536
3496623076?4727938742?7285964681?
T:
ronald2048
12842943322?17279292405?28595235043?
T:
ronald3072
30936570112?42748990487?73199353940?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
118053118276118593
T:
C:ntruees401ep2
120347122577124319
T:
C:mceliece
131729132069132363
T:
C:ntruees439ep1
175507180924182955
T:
rsa2048
176012182363188893
T:
cargocult2048
197591198245214916
T:
ronald1024
201541201821202339
T:
C:ntruees593ep1
263406264341267112
T:
C:ntruees743ep1
268998271606288850
T:
ronald1536
373637390778393382
T:
ronald2048
442555443359445248
T:
C:ntruees787ep1
672673678302693991
T:
ronald3072
822046824935829743
T:
mcnie4q1281
106623610831221097634
T:
ronald4096
109979611030211108226
T:
mcnie4q1282
133954313448891356516
T:
mcnie4q1921
157795315816901590783
T:
mcnie4q1922
164549616497661656278
T:
mcnie4q2561
168320316905451696094
T:
mcnie3q1281
191635719204391932849
T:
mcnie4q2562
208192320859082091990
T:
mcnie3q1282
253873725437302554627
T:
mcnie3q1921
282674628301372833861
T:
lotus128
302822830345263057288
T:
mcnie3q1922
343735534421543455337
T:
mcnie3q2561
426671142695244281296
T:
lotus192
440931544282364446851
T:
mcnie3q2562
604318160502806060957
T:
lotus256
Cycles to decrypt 59 bytes
25%50%75%system
167556167894168577
T:
C:ntruees401ep2
185566185711186086
T:
C:ntruees439ep1
285279285638286037
T:
C:ntruees593ep1
384561384997387012
T:
C:ntruees743ep1
762801764774772745
T:
C:ntruees787ep1
133248613543011373289
T:
C:mceliece
222533922435582253603
T:
mcnie4q1281
303373130500883057166
T:
mcnie3q1281
303317630534343077543
T:
mcnie4q1282
329687932988263308966
T:
lotus128
366139536825173709989
T:
mcnie4q1921
377905237928663808545
T:
mcnie3q1282
427773343126504357095
T:
mcnie4q1922
437262743953014419774
T:
mcnie4q2561
449073945061514521977
T:
mcnie3q1921
515260851819185211712
T:
mcnie4q2562
521309052213345235520
T:
lotus192
541508354321635460798
T:
mcnie3q1922
574894957593925777407
T:
mcnie3q2561
610585661407086188410
T:
ronald1024
752928375419657559812
T:
lotus256
760559676188587643916
T:
mcnie3q2562
172393961730349117367121
T:
ronald1536
216990652173361821770982
T:
rsa2048
217283522177257321849780
T:
cargocult2048
303960893048269530560752
T:
ronald2048
879557788808114188207038
T:
ronald3072
192844635193080581193270780
T:
ronald4096