VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Skylake (506e3); 2015 Intel Core i5-6500T; 4 x 2500MHz; thinksky, supercop-20251222

[Page version: 20260221 06:44:50]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
528059530341533048
T:
C:ntruees401ep2
610288613009616090
T:
C:ntruees439ep1
103992610431571049000
T:
C:ntruees593ep1
153887315429591549565
T:
C:ntruees743ep1
169182416934911709591
T:
C:3hfe
929725793383929435054
T:
lotus128
178056301796759318125702
T:
lotus192
207528612082901720896195
T:
C:ntruees787ep1
273914682787945527961115
T:
mcnie4q1281
299012483033754830625003
T:
lotus256
296515553044536931772294
T:
C:mceliece
364668173673770637106682
T:
mcnie3q1281
32457035?45140255?63023304?
T:
ronald1024
466878474688721147691957
T:
mcnie4q1282
524082905321209253980388
T:
mcnie3q1282
618943836215239462635206
T:
mcnie4q1921
701144027069808671106872
T:
mcnie3q1921
776075707774718777853084
T:
mcnie4q2561
831047278330025283451697
T:
mcnie4q1922
955970589658195097026870
T:
mcnie3q1922
971144939734392997717961
T:
mcnie3q2561
55139299?100129952?163789217?
T:
cargocult2048
65614656?103565125?146430892?
T:
rsa2048
107520104107651462107909291
T:
mcnie4q2562
158738291159088136159927315
T:
mcnie3q2562
198427802?265410951?373512453?
T:
ronald1536
332413662?440398699?646968216?
T:
ronald2048
1041055905?1525794063?2183538603?
T:
ronald3072
3014576362?4267541615?5882746405?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
398239934026
T:
C:3hfe
211282184722561
T:
rsa2048
212262197722529
T:
cargocult2048
358773614636741
T:
ronald1024
417834206642390
T:
C:ntruees401ep2
458604696947411
T:
ronald1536
474364775447981
T:
C:ntruees439ep1
510695160852344
T:
C:mceliece
593106009061404
T:
ronald2048
682326856168899
T:
C:ntruees593ep1
877988808288521
T:
C:ntruees743ep1
932029439396238
T:
ronald3072
106200106815107525
T:
C:ntruees787ep1
143000143872146577
T:
ronald4096
146153146535146866
T:
lotus128
209847210271210740
T:
lotus192
297561298169298934
T:
mcnie4q1281
299547300681301716
T:
lotus256
398175400085400914
T:
mcnie4q1282
491200492148494532
T:
mcnie4q1921
580879581453582173
T:
mcnie4q1922
594604595624597196
T:
mcnie4q2561
600870607780625823
T:
mcnie3q1281
694195696566699519
T:
mcnie4q2562
747096748472762842
T:
mcnie3q1282
933358954903966066
T:
mcnie3q1921
112674511300121142358
T:
mcnie3q1922
122343612266971230207
T:
mcnie3q2561
161493116163601619066
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
452694541545606
T:
C:ntruees401ep2
509295105551389
T:
C:ntruees439ep1
748327503275447
T:
C:ntruees593ep1
101168101658102397
T:
C:ntruees743ep1
135142136769139128
T:
C:ntruees787ep1
105042?154707?186779?
T:
C:3hfe
169586169842170152
T:
lotus128
248693249231249754
T:
lotus192
363095364334365792
T:
lotus256
850934853493859080
T:
C:mceliece
908279911860915984
T:
mcnie4q1281
902634917305927841
T:
ronald1024
119844412033061211063
T:
mcnie3q1281
122096312263931233264
T:
mcnie4q1282
146738414736691488304
T:
mcnie3q1282
150324915078791512608
T:
mcnie4q1921
175374117577791762246
T:
mcnie4q2561
176123817669931771145
T:
mcnie4q1922
180029018059011814360
T:
mcnie3q1921
208152720827072083859
T:
rsa2048
208656620886742092780
T:
cargocult2048
209270220992502106604
T:
mcnie4q2562
213012521426922158234
T:
mcnie3q1922
225453622613402268465
T:
mcnie3q2561
234145723572622371769
T:
ronald1536
297722229868482992077
T:
mcnie3q2562
346399434910583548748
T:
ronald2048
865825386832248710703
T:
ronald3072
176741141770874017752593
T:
ronald4096