VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Ivy Bridge+AES (306a9); 2012 Intel Core i5-3210M; 2 x 2500MHz; h9ivy, supercop-20251222

[Page version: 20260221 06:44:50]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: old (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
447541449531452416
T:
C:ntruees401ep2
563185566040568855
T:
C:ntruees439ep1
888038892151897364
T:
C:ntruees593ep1
128538112887701293510
T:
C:ntruees743ep1
187012318713651875986
T:
C:3hfe
147533371476672314856050
T:
lotus128
281603282817852828662814
T:
lotus192
321778453228464932402691
T:
C:ntruees787ep1
323350453335729135133520
T:
C:mceliece
384824243859720438755968
T:
mcnie4q1281
499309115014019050832785
T:
lotus256
547949475504373655601343
T:
mcnie3q1281
656791186606018866353116
T:
mcnie4q1282
739311667432447675019384
T:
mcnie3q1282
55921500?82278611?116703223?
T:
ronald1024
884009688849927488637214
T:
mcnie4q1921
101468187101818845102348727
T:
mcnie3q1921
115340856115497511115599043
T:
mcnie4q2561
121917430122033195122207829
T:
mcnie4q1922
137557829138071109138792608
T:
mcnie3q1922
142833648143154133143798680
T:
mcnie3q2561
74973203?158029995?235091712?
T:
rsa2048
158826311158966675159104525
T:
mcnie4q2562
97052826?170083611?270695836?
T:
cargocult2048
234573110235008015236102205
T:
mcnie3q2562
295596465?429346031?577876790?
T:
ronald1536
498599576?760573009?1101131353?
T:
ronald2048
1886089852?2656140210?4476911903?
T:
ronald3072
4505409887?7844040623?10923477520?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
710871197132
T:
C:3hfe
330813417936195
T:
cargocult2048
335783477936533
T:
rsa2048
457234597146377
T:
C:ntruees401ep2
454914601946627
T:
C:mceliece
476094834250040
T:
ronald1024
515985187952222
T:
C:ntruees439ep1
612956282263639
T:
ronald1536
760767640177156
T:
C:ntruees593ep1
820238338085291
T:
ronald2048
959469632097072
T:
C:ntruees743ep1
138550140291141888
T:
ronald3072
147693148198148842
T:
C:ntruees787ep1
211491213054214719
T:
ronald4096
342484342868343704
T:
lotus128
380881383505384459
T:
mcnie4q1281
511342512144513902
T:
lotus192
515216517475519632
T:
mcnie4q1282
635600636504637845
T:
mcnie4q1921
724965727644730259
T:
lotus256
756941764876773202
T:
mcnie4q1922
773375776599781989
T:
mcnie4q2561
828542831989835623
T:
mcnie3q1281
918320921138927310
T:
mcnie4q2562
984873985841987867
T:
mcnie3q1282
122149412378951243443
T:
mcnie3q1921
147304614766131490984
T:
mcnie3q1922
167094716724341676934
T:
mcnie3q2561
216439321764932184042
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
482434851649235
T:
C:ntruees401ep2
540885475156042
T:
C:ntruees439ep1
851568584787430
T:
C:ntruees593ep1
111129112214115229
T:
C:ntruees743ep1
155081?168218?195629?
T:
C:3hfe
222115222863224472
T:
C:ntruees787ep1
407950408950411496
T:
lotus128
643630644628646412
T:
lotus192
932386938180944982
T:
lotus256
102468010678821074003
T:
C:mceliece
106454710700621076885
T:
mcnie4q1281
123742412513631268004
T:
ronald1024
145887114656711478576
T:
mcnie3q1281
146098914676931474991
T:
mcnie4q1282
179019117987121806525
T:
mcnie4q1921
182191918336101841490
T:
mcnie3q1282
211259421191912131642
T:
mcnie4q1922
215869221667532177847
T:
mcnie4q2561
218844221935572199712
T:
mcnie3q1921
254904825586292566055
T:
mcnie4q2562
263250526401602652331
T:
mcnie3q1922
284214728519442857312
T:
mcnie3q2561
322299032256403230718
T:
cargocult2048
322017932270163228911
T:
rsa2048
331736733312523346403
T:
ronald1536
375855737842333858054
T:
mcnie3q2562
533801153586255381906
T:
ronald2048
143379431436614614401020
T:
ronald3072
304656613052732030606667
T:
ronald4096