VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Coffee Lake (806ea); 2018 Intel Core i3-8109U; 2 x 3000MHz; like, supercop-20251222

[Page version: 20260221 06:44:50]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
528819531446534851
T:
C:ntruees401ep2
610233612938616354
T:
C:ntruees439ep1
103827210444291048264
T:
C:ntruees593ep1
153716515406841546839
T:
C:ntruees743ep1
945046995884079718932
T:
lotus128
184140001846316318654361
T:
lotus192
207422442082457720896497
T:
C:ntruees787ep1
274701112753124927586918
T:
mcnie4q1281
292856033014015832301429
T:
C:mceliece
347276213505445535758958
T:
mcnie3q1281
321973513570123335897993
T:
lotus256
459682174690772947052494
T:
mcnie4q1282
513657725174863452344901
T:
mcnie3q1282
35408683?53403839?76724433?
T:
ronald1024
614764766161196561720797
T:
mcnie4q1921
658834436625741466806009
T:
mcnie3q1921
781321017909871079235986
T:
mcnie4q2561
800667788016674180310254
T:
mcnie4q1922
892181968962379390081373
T:
mcnie3q1922
51912738?93584479?147882979?
T:
cargocult2048
938041439411071194533885
T:
mcnie3q2561
105937246106054676106197333
T:
mcnie4q2562
55718240?117659612?185008546?
T:
rsa2048
150416599150940730151876173
T:
mcnie3q2562
203483871?282760042?398228778?
T:
ronald1536
285637773?410488407?597738030?
T:
ronald2048
1060744363?1635092699?2479707936?
T:
ronald3072
2559757378?3853803320?5085143526?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
219772277324395
T:
rsa2048
222442300424639
T:
cargocult2048
359283651737469
T:
ronald1024
418474211242413
T:
C:ntruees401ep2
462334669647348
T:
C:mceliece
465364690248046
T:
ronald1536
475894792648523
T:
C:ntruees439ep1
603046125762399
T:
ronald2048
684306884869404
T:
C:ntruees593ep1
881318850888897
T:
C:ntruees743ep1
945459561097267
T:
ronald3072
106879107406108096
T:
C:ntruees787ep1
140502141392142912
T:
ronald4096
147712148258148963
T:
lotus128
211085211542212108
T:
lotus192
278695279311280401
T:
mcnie4q1281
286643287410331258
T:
lotus256
374270374709375395
T:
mcnie4q1282
462977464002468488
T:
mcnie4q1921
563823565514568685
T:
mcnie4q2561
593177594533595282
T:
mcnie3q1281
595392597283601105
T:
mcnie4q1922
653176654689656578
T:
mcnie4q2562
712854715478733719
T:
mcnie3q1282
904545907117912618
T:
mcnie3q1921
109689911005011101787
T:
mcnie3q1922
121354912190381221190
T:
mcnie3q2561
154113515537821557912
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
452474538345622
T:
C:ntruees401ep2
512425151951822
T:
C:ntruees439ep1
751267539576298
T:
C:ntruees593ep1
101744102111102650
T:
C:ntruees743ep1
142187142728144495
T:
C:ntruees787ep1
170585171207172528
T:
lotus128
249202250165250647
T:
lotus192
362042367009393820
T:
lotus256
848370853754862202
T:
C:mceliece
888380891113894682
T:
mcnie4q1281
910576920561930324
T:
ronald1024
119753012039931208168
T:
mcnie3q1281
120222212064941211116
T:
mcnie4q1282
145964214637711468345
T:
mcnie4q1921
149331914992641505991
T:
mcnie3q1282
171418617191951724833
T:
mcnie4q2561
173702717420801745862
T:
mcnie4q1922
177405517811211789088
T:
mcnie3q1921
201208820207112028463
T:
mcnie4q2562
209286620972952099683
T:
rsa2048
209339120998562102217
T:
cargocult2048
210546921119162119971
T:
mcnie3q1922
224778022534572260255
T:
mcnie3q2561
234801723624302375949
T:
ronald1536
291645229201992925510
T:
mcnie3q2562
347253434837133507346
T:
ronald2048
869995487208038746076
T:
ronald3072
176702451775573017792647
T:
ronald4096