VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; K10 45nm (100f63); 2010 AMD Athlon II Neo K125; 1 x 1700MHz; h3neo, supercop-20250922

[Page version: 20251103 11:56:17]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: old (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
120779612112321217617
T:
C:ntruees401ep2
141957514240601429398
T:
C:ntruees439ep1
240483924121252418072
T:
C:ntruees593ep1
365625636668573674587
T:
C:ntruees743ep1
460080654609774646180770
T:
mcnie4q1281
432251714637465849371105
T:
C:mceliece
551084805529312155515627
T:
lotus128
613516796172531362272936
T:
mcnie3q1281
787714917888112179035282
T:
mcnie4q1282
879534008846082789164258
T:
mcnie3q1282
941365449460851494925947
T:
C:ntruees787ep1
100225519100365828100497912
T:
mcnie4q1921
105707298106035731106771827
T:
lotus192
68231249?108401215?204853689?
T:
rsa2048
112454134112720571113337852
T:
mcnie3q1921
90759339?116340265?197526225?
T:
ronald1024
124214711124338190124487224
T:
mcnie4q2561
134866250135060129135210260
T:
mcnie4q1922
91658748?151613932?230357798?
T:
cargocult2048
152312238152635410153371744
T:
mcnie3q2561
152669794153056997153801063
T:
mcnie3q1922
173439611173559124173733177
T:
mcnie4q2562
183757232184045919187708564
T:
lotus256
255759337256624285257542903
T:
mcnie3q2562
331525523?509913441?718850934?
T:
ronald1536
819772758?1177913801?1723667216?
T:
ronald2048
2533256854?3782268138?5980581499?
T:
ronald3072
6669534760?10549734962?14910489395?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
487295215157399
T:
rsa2048
493785467757490
T:
cargocult2048
587625969960377
T:
C:mceliece
640946443472135
T:
ronald1024
683296867669406
T:
C:ntruees401ep2
763367706177764
T:
C:ntruees439ep1
860338739494875
T:
ronald1536
115080116117116913
T:
C:ntruees593ep1
115519122668131697
T:
ronald2048
153085154095155221
T:
C:ntruees743ep1
197767199684207332
T:
ronald3072
250083250892252131
T:
C:ntruees787ep1
304582311984320711
T:
ronald4096
509983512116513048
T:
mcnie4q1281
685371691160692629
T:
mcnie4q1282
760637765755805332
T:
lotus128
819558821057822190
T:
mcnie4q1921
975509976530979939
T:
mcnie4q2561
975113980508986852
T:
mcnie4q1922
102372710252611026638
T:
mcnie3q1281
117195111753611177102
T:
mcnie4q2562
118293511916481197489
T:
lotus192
127496212793831283016
T:
mcnie3q1282
154502915460321547211
T:
mcnie3q1921
172743817322391737240
T:
lotus256
184982618513671858781
T:
mcnie3q1922
199826219994362000551
T:
mcnie3q2561
264837226532372656306
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
9913799870100594
T:
C:ntruees401ep2
111193111479112169
T:
C:ntruees439ep1
169128170123171354
T:
C:ntruees593ep1
233582237718239024
T:
C:ntruees743ep1
428260431755433407
T:
C:ntruees787ep1
934717947945971011
T:
lotus128
100197710244921040044
T:
C:mceliece
123884012422241248083
T:
mcnie4q1281
152467615373541551597
T:
lotus192
169673816993111705309
T:
mcnie3q1281
169121617003831706488
T:
mcnie4q1282
175490317789591796927
T:
ronald1024
205670120686892080247
T:
mcnie4q1921
210502421127472120647
T:
mcnie3q1282
224315722481162254447
T:
lotus256
238054723897372399582
T:
mcnie4q1922
242177924348192443311
T:
mcnie4q2561
250733125205482539510
T:
mcnie3q1921
284348528545922864437
T:
mcnie4q2562
302829830392193051471
T:
mcnie3q1922
315620731664303175824
T:
mcnie3q2561
318369431884283198714
T:
rsa2048
317698731973943197976
T:
cargocult2048
423064142377734264749
T:
mcnie3q2562
451433545398744571924
T:
ronald1536
762632376545667683322
T:
ronald2048
204903552053902420600186
T:
ronald3072
425373624260387242660870
T:
ronald4096