VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Bonnell (106ca); 2011 Intel Atom N435; 1 x 1330MHz; h4atom, supercop-20250922

[Page version: 20260221 06:44:50]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: old (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
126652412819611293627
T:
C:ntruees401ep2
146852114787231488813
T:
C:ntruees439ep1
250407325154902532649
T:
C:ntruees593ep1
373656537518103770466
T:
C:ntruees743ep1
783558367847875178639316
T:
mcnie4q1281
852848998992408798732763
T:
C:mceliece
104689442105299502106419632
T:
mcnie3q1281
109698492109932446112872592
T:
lotus128
134417261134611130134863390
T:
mcnie4q1282
150623647151518848153066284
T:
mcnie3q1282
167690999168575652169222297
T:
C:ntruees787ep1
173699574174365234187678505
T:
mcnie4q1921
194805346196165553200169798
T:
mcnie3q1921
228673963229220352229455784
T:
lotus192
233529373233867062234112181
T:
mcnie4q1922
221740058239263699266003727
T:
mcnie4q2561
263978676264681813266502596
T:
mcnie3q1922
274114232274987338275866361
T:
mcnie3q2561
304806707305147805305642457
T:
mcnie4q2562
405084879406269035406627157
T:
lotus256
450013329450903807452574644
T:
mcnie3q2562
364851187?581708912?789894503?
T:
ronald1024
431582345?881792013?1426697884?
T:
cargocult2048
644540893?938397630?1530622076?
T:
rsa2048
1661348730?2317471183?3393853883?
T:
ronald1536
3496623076?4727938742?7285964681?
T:
ronald2048
12842943322?17279292405?28595235043?
T:
ronald3072
30936570112?42748990487?73199353940?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
118053118276118593
T:
C:ntruees401ep2
120347122577124319
T:
C:mceliece
131729132069132363
T:
C:ntruees439ep1
175507180924182955
T:
rsa2048
176012182363188893
T:
cargocult2048
197591198245214916
T:
ronald1024
201541201821202339
T:
C:ntruees593ep1
263406264341267112
T:
C:ntruees743ep1
268998271606288850
T:
ronald1536
373637390778393382
T:
ronald2048
442555443359445248
T:
C:ntruees787ep1
672673678302693991
T:
ronald3072
822046824935829743
T:
mcnie4q1281
106623610831221097634
T:
ronald4096
109979611030211108226
T:
mcnie4q1282
133954313448891356516
T:
mcnie4q1921
157795315816901590783
T:
mcnie4q1922
164549616497661656278
T:
mcnie4q2561
168320316905451696094
T:
mcnie3q1281
191635719204391932849
T:
mcnie4q2562
208192320859082091990
T:
mcnie3q1282
253873725437302554627
T:
mcnie3q1921
282674628301372833861
T:
lotus128
302822830345263057288
T:
mcnie3q1922
343735534421543455337
T:
mcnie3q2561
426671142695244281296
T:
lotus192
440931544282364446851
T:
mcnie3q2562
604318160502806060957
T:
lotus256
Cycles to decrypt 59 bytes
25%50%75%system
167556167894168577
T:
C:ntruees401ep2
185566185711186086
T:
C:ntruees439ep1
285279285638286037
T:
C:ntruees593ep1
384561384997387012
T:
C:ntruees743ep1
762801764774772745
T:
C:ntruees787ep1
133248613543011373289
T:
C:mceliece
222533922435582253603
T:
mcnie4q1281
303373130500883057166
T:
mcnie3q1281
303317630534343077543
T:
mcnie4q1282
329687932988263308966
T:
lotus128
366139536825173709989
T:
mcnie4q1921
377905237928663808545
T:
mcnie3q1282
427773343126504357095
T:
mcnie4q1922
437262743953014419774
T:
mcnie4q2561
449073945061514521977
T:
mcnie3q1921
515260851819185211712
T:
mcnie4q2562
521309052213345235520
T:
lotus192
541508354321635460798
T:
mcnie3q1922
574894957593925777407
T:
mcnie3q2561
610585661407086188410
T:
ronald1024
752928375419657559812
T:
lotus256
760559676188587643916
T:
mcnie3q2562
172393961730349117367121
T:
ronald1536
216990652173361821770982
T:
rsa2048
217283522177257321849780
T:
cargocult2048
303960893048269530560752
T:
ronald2048
879557788808114188207038
T:
ronald3072
192844635193080581193270780
T:
ronald4096