VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Zen 4 (a60f12); 2023 AMD Ryzen 7 7700; 8 x 3800MHz; hertz, supercop-20260217

[Page version: 20260221 06:44:50]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
399704056341431
T:
r5nd1pke5d
532485398255018
T:
r5nd1pke0d
710167185372946
T:
r5nd3pke0d
709297210273404
T:
r5nd3pke5d
850928582686648
T:
r5nd5pke0d
119933122220124609
T:
r5nd5pke5d
389314?425380?552613?
T:
r5n11pke0d
887391890784894107
T:
r5n13pke0d
112046211263911132979
T:
r5n15pke0d
282096828271022831939
T:
ledapkc1464
328349933001153594415
T:
ledapkc1364
347542534794383486196
T:
ledapkc1264
4128501?4136442?5694205?
T:
ledapkc14sl
4250381?4628042?5802164?
T:
ledapkc13sl
580740958173506339443
T:
ledapkc12sl
5861095?6004816?8653188?
T:
ledapkc3464
724166072847747327525
T:
ledapkc3364
748091774898207501642
T:
lotus128
851484185698028968448
T:
ledapkc33sl
884344789244049249648
T:
ledapkc3264
9403609948317111035061
T:
ledapkc34sl
9868703989143310024988
T:
ledapkc5464
117857921203221413415586
T:
ledapkc32sl
124345391244767912463863
T:
ledapkc5364
137825941379195216932484
T:
ledapkc54sl
144106801441798714438621
T:
lotus192
156138491569983115774374
T:
C:ntruees787ep1
180180691855990020176661
T:
ledapkc5264
186823351899433122233034
T:
ledapkc53sl
197980312052173220565580
T:
r5n13pke0smallct
227744032282344122878956
T:
mcnie4q1281
242986292505867926427168
T:
C:mceliece
263900672640240626473414
T:
lotus256
303901403057177430951559
T:
mcnie3q1281
295633313071445432782829
T:
ledapkc52sl
390020003906347439170288
T:
mcnie4q1282
29002337?43461613?69432173?
T:
ronald1024
435356054391203744608784
T:
mcnie3q1282
504355245051141650613124
T:
mcnie4q1921
565922035683340257263849
T:
mcnie3q1921
655518396563478965744302
T:
mcnie4q2561
678002276788703768003778
T:
mcnie4q1922
764745867679176777251266
T:
mcnie3q1922
812565108147123481790768
T:
mcnie3q2561
893769838947566289601914
T:
mcnie4q2562
131641356132002392132738633
T:
mcnie3q2562
187492624?276901902?426518153?
T:
ronald1536
297842457?413720914?571230219?
T:
ronald2048
1128394829?1719823505?2464997488?
T:
ronald3072
2806774028?4227192866?6755739828?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
245792470125357
T:
ronald1024
330463365534771
T:
ronald1536
372143757138018
T:
C:mceliece
447074578246738
T:
ronald2048
762417650676916
T:
C:ntruees787ep1
760957664477462
T:
r5nd1pke5d
778367871380224
T:
ronald3072
974149819998923
T:
r5nd1pke0d
104079104458104722
T:
lotus128
121474122651123904
T:
ronald4096
128528129318130195
T:
r5nd3pke5d
130759131728133993
T:
r5nd3pke0d
144717145264145658
T:
lotus192
159607160279160896
T:
r5nd5pke0d
206238207497209158
T:
r5nd5pke5d
233709234256235190
T:
mcnie4q1281
217458254666266150
T:
lotus256
314432315462316670
T:
mcnie4q1282
388800391217395698
T:
mcnie4q1921
456864457790459057
T:
mcnie4q1922
476270477177478352
T:
mcnie3q1281
482879484098485329
T:
mcnie4q2561
484648485821486701
T:
r5n11pke0d
563397564844567091
T:
mcnie4q2562
588321591484601093
T:
ledapkc1264
592096594470595913
T:
mcnie3q1282
687701694745703697
T:
ledapkc1364
712500716314725843
T:
ledapkc12sl
726097730893743386
T:
ledapkc1464
746950748214749806
T:
mcnie3q1921
802672805257813477
T:
ledapkc13sl
875946877645879621
T:
mcnie3q1922
911456916875931604
T:
ledapkc14sl
101194810142591016302
T:
mcnie3q2561
108525310962271104994
T:
r5n13pke0d
109602111085031126773
T:
ledapkc3264
126358012688261292866
T:
ledapkc3364
128774412914811296678
T:
mcnie3q2562
129317013030461329400
T:
ledapkc3464
130624213132721327426
T:
ledapkc32sl
140604114384161476555
T:
r5n15pke0d
152633315377391562161
T:
ledapkc33sl
187395818801471887136
T:
r5n13pke0smallct
189647219066651926383
T:
ledapkc5264
189305419070931938657
T:
ledapkc34sl
209487821017702145327
T:
ledapkc5364
223694222442442293846
T:
ledapkc5464
255103725628282592670
T:
ledapkc52sl
271569427228702755455
T:
ledapkc54sl
281429228278042872432
T:
ledapkc53sl
Cycles to decrypt 59 bytes
25%50%75%system
693087009371011
T:
r5nd1pke5d
9687297374100942
T:
C:ntruees787ep1
100490101060104919
T:
r5nd1pke0d
118328118782123114
T:
lotus128
125459127078127648
T:
r5nd3pke5d
149697151396160777
T:
r5nd3pke0d
168452169273169783
T:
lotus192
192654193804200062
T:
r5nd5pke0d
211162212801215579
T:
r5nd5pke5d
259368297710299596
T:
lotus256
539370539932540618
T:
r5n11pke0d
554274555685560232
T:
mcnie4q1281
672554678408685062
T:
ronald1024
747038749393755109
T:
mcnie3q1281
760204763738774766
T:
mcnie4q1282
807974831946836381
T:
C:mceliece
900150907497919681
T:
mcnie4q1921
931107934485941402
T:
mcnie3q1282
107049510747271089158
T:
mcnie4q1922
111437511274201143558
T:
mcnie4q2561
113432911395441154444
T:
mcnie3q1921
127954112865151296869
T:
r5n13pke0d
131261013195091343788
T:
mcnie4q2562
138561413929911417369
T:
mcnie3q1922
154397715507971578310
T:
mcnie3q2561
156670215757471587035
T:
ledapkc1264
160652016538621656288
T:
r5n15pke0d
183819818502011862182
T:
ronald2048
194385519583421983769
T:
ledapkc1364
196077319694401979045
T:
ronald1536
201879120376682052859
T:
ledapkc1464
207242020923762147801
T:
mcnie3q2562
220690822202362251453
T:
ledapkc12sl
242068624442082467588
T:
ledapkc13sl
267010026802502688694
T:
ledapkc14sl
411488341403454190343
T:
ledapkc3264
434633343639624387445
T:
ronald3072
450516245345294568944
T:
ledapkc3464
454515445694664732622
T:
ledapkc3364
525206952823085292891
T:
ledapkc32sl
611696161318566198528
T:
ledapkc33sl
699163470157067051859
T:
ledapkc34sl
747625975225508195868
T:
r5n13pke0smallct
824597482661768294107
T:
ronald4096
910717591393539263448
T:
ledapkc5264
915970091929279214630
T:
ledapkc5364
99972701003208710050554
T:
ledapkc5464
126718071271166612843563
T:
ledapkc52sl
128864501296328513021048
T:
ledapkc54sl
131185571324308313395753
T:
ledapkc53sl