VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Bonnell (106ca); 2010 Intel Atom N455; 1 x 1000MHz; h2atom, supercop-20241022

[Page version: 20241215 22:59:14]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: old (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
78370797?78977306?98560209?
T:
mcnie4q1281
855360118991399098234127
T:
C:mceliece
119735342119976995120389636
T:
ledapkc1464
134521750135087650136085087
T:
mcnie4q1282
138520049139342340140455317
T:
mcnie3q1281
154564751154748927155145943
T:
ledapkc1364
173782337?174972059?245513496?
T:
mcnie4q1921
175903559176436565184319264
T:
ledapkc14sl
199991235?202919498?265548188?
T:
mcnie3q1282
221134207221415240222149228
T:
mcnie4q2561
233488436233906570234562347
T:
mcnie4q1922
235617490240327983245328783
T:
ledapkc13sl
261947142264580736297704915
T:
mcnie3q1921
300765738301440422305976809
T:
ledapkc1264
304899948305573878308074559
T:
mcnie4q2562
333443635333964152350682682
T:
ledapkc3464
351481764352843191354892558
T:
mcnie3q1922
368397068370133774373495579
T:
mcnie3q2561
408915869410351308411400480
T:
ledapkc12sl
436893150437231716437532123
T:
ledapkc3364
439823023440455605458988202
T:
ledapkc34sl
568742697569084787569372015
T:
ledapkc5464
573630460574048273577629508
T:
ledapkc33sl
603326455606641829643740990
T:
mcnie3q2562
697701707698179386701654420
T:
ledapkc3264
900708014900976660901739253
T:
ledapkc5364
107740149810780075861110357257
T:
ledapkc54sl
116802856411719014131177521801
T:
ledapkc32sl
131381553913149207021333258800
T:
ledapkc53sl
134694563213489716921356169261
T:
ledapkc5264
265167135926598875732669070628
T:
ledapkc52sl
Cycles to encrypt 59 bytes
25%50%75%system
122515124197125886
T:
C:mceliece
837363?844116?1199740?
T:
mcnie4q1281
111828111223411129996
T:
mcnie4q1282
159733016031901631864
T:
mcnie4q1922
1666852?1724620?2438234?
T:
mcnie4q2561
1933561?1944959?2597828?
T:
mcnie4q2562
1358665?1944980?1988346?
T:
mcnie4q1921
284089228609542876064
T:
mcnie3q1281
349038635090753540433
T:
mcnie3q1282
427071242879394308567
T:
mcnie3q1921
503235150627605097851
T:
mcnie3q1922
585419458667535889513
T:
mcnie3q2561
731818673525227402847
T:
mcnie3q2562
172445251727497817310578
T:
ledapkc1264
173312541735129817393252
T:
ledapkc1364
203035692033554720369766
T:
ledapkc1464
212355662126837221310599
T:
ledapkc12sl
236595442370799323774674
T:
ledapkc13sl
255216352555431425625560
T:
ledapkc14sl
372506583728684037368216
T:
ledapkc3264
408682134090846040999689
T:
ledapkc3364
480755204813422248285491
T:
ledapkc3464
569200595697973757133208
T:
ledapkc32sl
582180255831225058534839
T:
ledapkc33sl
695618726964096769918323
T:
ledapkc34sl
734094237361258473846133
T:
ledapkc5264
855623468566482385884188
T:
ledapkc5464
869085558708623287250043
T:
ledapkc5364
126444025126696260126853904
T:
ledapkc53sl
127123069127382667127597099
T:
ledapkc52sl
142016500142319591142528285
T:
ledapkc54sl
Cycles to decrypt 59 bytes
25%50%75%system
135402013661851370140
T:
C:mceliece
2208935?2227062?3169846?
T:
mcnie4q1281
301027330285543057435
T:
mcnie4q1282
359683236430233779189
T:
mcnie4q1921
390288139333163987846
T:
mcnie3q1281
4247432?4282128?6130395?
T:
mcnie4q1922
4279896?4337427?6283768?
T:
mcnie4q2561
482317948785864910174
T:
mcnie3q1282
5076209?5113398?7342081?
T:
mcnie4q2562
580934958388045875574
T:
mcnie3q1921
699091670237027064223
T:
mcnie3q1922
764789877431727768929
T:
mcnie3q2561
9938887997167010152120
T:
mcnie3q2562
298493182992101530067057
T:
ledapkc1264
319039373195557232197338
T:
ledapkc1364
347362523480287834873109
T:
ledapkc12sl
378233593788061637978935
T:
ledapkc1464
452461344536700845535442
T:
ledapkc14sl
496728574979169650020704
T:
ledapkc13sl
797763578013267280307890
T:
ledapkc3264
869943638743276387966307
T:
ledapkc3364
100025066100444882101056486
T:
ledapkc3464
101482804101813921102106859
T:
ledapkc32sl
121605603122393909123010665
T:
ledapkc33sl
131557176133059641133369549
T:
ledapkc34sl
161399609161673760161961773
T:
ledapkc5264
191015164191342333191605788
T:
ledapkc5364
230753100230891009231290497
T:
ledapkc5464
233301134233724079234102338
T:
ledapkc52sl
256122004256546557256876733
T:
ledapkc53sl
301632118301906056302418242
T:
ledapkc54sl