VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Golden Cove (90675-00); 2022 Intel Core i3-12100; 4 x 3300MHz; alder, supercop-20250415

[Page version: 20250419 12:16:57]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
334698337284341334
T:
C:ntruees401ep2
414022417062420096
T:
C:ntruees439ep1
678996682079686170
T:
C:ntruees593ep1
99739010010051007058
T:
C:ntruees743ep1
636818263809376428966
T:
lotus128
125423561255053712566320
T:
lotus192
204017402042301920547900
T:
lotus256
214280202146773721533377
T:
mcnie4q1281
222557152232422222394104
T:
C:ntruees787ep1
297277643018989030850360
T:
mcnie3q1281
300020063052097831515822
T:
C:mceliece
369427333809170638990135
T:
mcnie4q1282
418443684284867243484332
T:
mcnie3q1282
33666122?49420163?73842843?
T:
ronald1024
515063285211348453072747
T:
mcnie4q1921
529631005323611653645115
T:
mcnie3q1921
631375786370924964529529
T:
mcnie4q2561
42653431?68090219?106387322?
T:
rsa2048
683583946958407170684582
T:
mcnie4q1922
717218047209605772598935
T:
mcnie3q1922
48526323?72291030?113447432?
T:
cargocult2048
794121138029896081835998
T:
mcnie3q2561
857674588675593387640681
T:
mcnie4q2562
124447261124832131125539085
T:
mcnie3q2562
158750725?215741829?287631135?
T:
ronald1536
262937524?388239324?575333886?
T:
ronald2048
865441782?1314761795?1870363555?
T:
ronald3072
2206327709?3289161968?4997962644?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
149101528215975
T:
cargocult2048
150801568316346
T:
rsa2048
253352571926605
T:
ronald1024
291502962230057
T:
C:ntruees401ep2
335833414634938
T:
ronald1536
389543924339724
T:
C:ntruees439ep1
446664510045989
T:
ronald2048
461854673147438
T:
C:mceliece
547585528755894
T:
C:ntruees593ep1
697797032270874
T:
C:ntruees743ep1
753517616977348
T:
ronald3072
853848592686600
T:
C:ntruees787ep1
118883120330121528
T:
ronald4096
92327?130451?131267?
T:
lotus128
135330135914136766
T:
lotus192
187867188272188768
T:
lotus256
221159221813222969
T:
mcnie4q1281
339361341140342746
T:
mcnie4q1282
381902383691391999
T:
mcnie4q1921
447559450700461150
T:
mcnie4q1922
470345476714481481
T:
mcnie4q2561
481125486195509987
T:
mcnie3q1281
539449547101562262
T:
mcnie4q2562
590842628366632497
T:
mcnie3q1282
699056701246703200
T:
mcnie3q1921
832555834114837746
T:
mcnie3q1922
978633988896992498
T:
mcnie3q2561
123125612342191237721
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
292542949229850
T:
C:ntruees401ep2
410514156941868
T:
C:ntruees439ep1
575745801058983
T:
C:ntruees593ep1
788997946580270
T:
C:ntruees743ep1
102416102826112912
T:
C:ntruees787ep1
107310?124541?139172?
T:
lotus128
163150164238166252
T:
lotus192
232784233070234416
T:
lotus256
621334627131641118
T:
mcnie4q1281
614480629328636321
T:
C:mceliece
662848670378675845
T:
ronald1024
904121919724949125
T:
mcnie4q1282
939682947802970131
T:
mcnie3q1281
116810511800151209111
T:
mcnie3q1282
117623911925331215758
T:
mcnie4q1921
139782514075291435862
T:
mcnie4q1922
144391314502381457857
T:
mcnie3q1921
143791614559891481263
T:
mcnie4q2561
158695715902221593824
T:
cargocult2048
158942215918461595860
T:
rsa2048
169597217051341722919
T:
mcnie4q2562
171807417257321732344
T:
mcnie3q1922
173789917467181761610
T:
ronald1536
189778119100471920260
T:
mcnie3q2561
247190924801182528682
T:
mcnie3q2562
282590028359962848483
T:
ronald2048
759749176114547632365
T:
ronald3072
162755461630192516326027
T:
ronald4096