VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Coffee Lake (806ea); 2018 Intel Core i3-8109U; 2 x 3000MHz; like, supercop-20251114

[Page version: 20251125 18:44:47]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
528819531446534851
T:
C:ntruees401ep2
610233612938616354
T:
C:ntruees439ep1
103827210444291048264
T:
C:ntruees593ep1
153716515406841546839
T:
C:ntruees743ep1
945046995884079718932
T:
lotus128
184140001846316318654361
T:
lotus192
207422442082457720896497
T:
C:ntruees787ep1
274701112753124927586918
T:
mcnie4q1281
292856033014015832301429
T:
C:mceliece
347276213505445535758958
T:
mcnie3q1281
321973513570123335897993
T:
lotus256
459682174690772947052494
T:
mcnie4q1282
513657725174863452344901
T:
mcnie3q1282
35408683?53403839?76724433?
T:
ronald1024
614764766161196561720797
T:
mcnie4q1921
658834436625741466806009
T:
mcnie3q1921
781321017909871079235986
T:
mcnie4q2561
800667788016674180310254
T:
mcnie4q1922
892181968962379390081373
T:
mcnie3q1922
51912738?93584479?147882979?
T:
cargocult2048
938041439411071194533885
T:
mcnie3q2561
105937246106054676106197333
T:
mcnie4q2562
55718240?117659612?185008546?
T:
rsa2048
150416599150940730151876173
T:
mcnie3q2562
203483871?282760042?398228778?
T:
ronald1536
285637773?410488407?597738030?
T:
ronald2048
1060744363?1635092699?2479707936?
T:
ronald3072
2559757378?3853803320?5085143526?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
219772277324395
T:
rsa2048
222442300424639
T:
cargocult2048
359283651737469
T:
ronald1024
418474211242413
T:
C:ntruees401ep2
462334669647348
T:
C:mceliece
465364690248046
T:
ronald1536
475894792648523
T:
C:ntruees439ep1
603046125762399
T:
ronald2048
684306884869404
T:
C:ntruees593ep1
881318850888897
T:
C:ntruees743ep1
945459561097267
T:
ronald3072
106879107406108096
T:
C:ntruees787ep1
140502141392142912
T:
ronald4096
147712148258148963
T:
lotus128
211085211542212108
T:
lotus192
278695279311280401
T:
mcnie4q1281
286643287410331258
T:
lotus256
374270374709375395
T:
mcnie4q1282
462977464002468488
T:
mcnie4q1921
563823565514568685
T:
mcnie4q2561
593177594533595282
T:
mcnie3q1281
595392597283601105
T:
mcnie4q1922
653176654689656578
T:
mcnie4q2562
712854715478733719
T:
mcnie3q1282
904545907117912618
T:
mcnie3q1921
109689911005011101787
T:
mcnie3q1922
121354912190381221190
T:
mcnie3q2561
154113515537821557912
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
452474538345622
T:
C:ntruees401ep2
512425151951822
T:
C:ntruees439ep1
751267539576298
T:
C:ntruees593ep1
101744102111102650
T:
C:ntruees743ep1
142187142728144495
T:
C:ntruees787ep1
170585171207172528
T:
lotus128
249202250165250647
T:
lotus192
362042367009393820
T:
lotus256
848370853754862202
T:
C:mceliece
888380891113894682
T:
mcnie4q1281
910576920561930324
T:
ronald1024
119753012039931208168
T:
mcnie3q1281
120222212064941211116
T:
mcnie4q1282
145964214637711468345
T:
mcnie4q1921
149331914992641505991
T:
mcnie3q1282
171418617191951724833
T:
mcnie4q2561
173702717420801745862
T:
mcnie4q1922
177405517811211789088
T:
mcnie3q1921
201208820207112028463
T:
mcnie4q2562
209286620972952099683
T:
rsa2048
209339120998562102217
T:
cargocult2048
210546921119162119971
T:
mcnie3q1922
224778022534572260255
T:
mcnie3q2561
234801723624302375949
T:
ronald1536
291645229201992925510
T:
mcnie3q2562
347253434837133507346
T:
ronald2048
869995487208038746076
T:
ronald3072
176702451775573017792647
T:
ronald4096