VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Zen 4 (a60f12); 2023 AMD Ryzen 7 7700; 8 x 3800MHz; hertz, supercop-20260330

[Page version: 20260415 05:36:59]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
401864069041491
T:
r5nd1pke5d
531125405255045
T:
r5nd1pke0d
707267156472620
T:
r5nd3pke0d
708397172873248
T:
r5nd3pke5d
852438585586932
T:
r5nd5pke0d
119482120636122770
T:
r5nd5pke5d
387176388665390414
T:
r5n11pke0d
883267886087889901
T:
r5n13pke0d
111946911273531138263
T:
r5n15pke0d
281258828176582823660
T:
ledapkc1464
327143532823173299506
T:
ledapkc1364
349892635104593785983
T:
ledapkc1264
4115854?4125998?5745759?
T:
ledapkc14sl
4252073?4991754?6355788?
T:
ledapkc13sl
5852402?5862030?8225910?
T:
ledapkc3464
584197658713526328301
T:
ledapkc12sl
724408272762337313746
T:
ledapkc3364
747762774852847491715
T:
lotus128
852747085485299344625
T:
ledapkc33sl
883502188643209078658
T:
ledapkc3264
939986094387619809744
T:
ledapkc34sl
984934898609969871274
T:
ledapkc5464
117179971183560613336730
T:
ledapkc32sl
124196531246151312471392
T:
ledapkc5364
137891001379977816268458
T:
ledapkc54sl
144137031442219814445376
T:
lotus192
156402041570671215759398
T:
C:ntruees787ep1
183233541836519720491713
T:
ledapkc53sl
180839831864847921249921
T:
ledapkc5264
197604762039542620451466
T:
r5n13pke0smallct
216590982170028321766837
T:
mcnie4q1281
242021072428651024335959
T:
lotus256
246746192542306426383468
T:
C:mceliece
289167632911726729461803
T:
mcnie3q1281
295991953120610232518378
T:
ledapkc52sl
370688743711860637224914
T:
mcnie4q1282
413259334169543142291664
T:
mcnie3q1282
33409252?47929375?67025756?
T:
ronald1024
482376094829725148407510
T:
mcnie4q1921
539527095423628454728309
T:
mcnie3q1921
626786996277397962881527
T:
mcnie4q2561
648317926492096065036140
T:
mcnie4q1922
731284647354751274181315
T:
mcnie3q1922
779814207824961978795189
T:
mcnie3q2561
860081068619194486400307
T:
mcnie4q2562
126622045127315928128107356
T:
mcnie3q2562
151202421?229820884?334833509?
T:
ronald1536
291983842?437544369?642511342?
T:
ronald2048
1004339390?1471383403?2155644343?
T:
ronald3072
3224088030?4346429912?7107838613?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
241912431925026
T:
ronald1024
326883311134004
T:
ronald1536
404084085941442
T:
C:mceliece
443884510945753
T:
ronald2048
760667672577326
T:
r5nd1pke5d
770777774478432
T:
C:ntruees787ep1
772477819079121
T:
ronald3072
971329779298557
T:
r5nd1pke0d
102779103205103781
T:
lotus128
120718122223123777
T:
ronald4096
128509129405130387
T:
r5nd3pke5d
130511131204131848
T:
r5nd3pke0d
144969145696146428
T:
lotus192
159623160299160983
T:
r5nd5pke0d
200387201223202092
T:
lotus256
205980207261208730
T:
r5nd5pke5d
226169226880227985
T:
mcnie4q1281
304454305050306307
T:
mcnie4q1282
376274376948378351
T:
mcnie4q1921
438935440671443032
T:
mcnie4q1922
467444469148471123
T:
mcnie4q2561
468813469988471337
T:
mcnie3q1281
483571485297489335
T:
r5n11pke0d
543210544419546588
T:
mcnie4q2562
579564581222582977
T:
mcnie3q1282
586514591823600620
T:
ledapkc1264
696552705270715144
T:
ledapkc1364
713130714389716154
T:
mcnie3q1921
710952716789730670
T:
ledapkc12sl
726454737020758332
T:
ledapkc1464
804258808546829970
T:
ledapkc13sl
855428857106859938
T:
mcnie3q1922
909559912643927847
T:
ledapkc14sl
986710987914989747
T:
mcnie3q2561
108449810895131097140
T:
r5n13pke0d
109445611087541120098
T:
ledapkc3264
125887612636061270380
T:
mcnie3q2562
126316412730861303151
T:
ledapkc3364
128629912912221311575
T:
ledapkc3464
130909913155811335628
T:
ledapkc32sl
141614014436571448447
T:
r5n15pke0d
152174715282231573653
T:
ledapkc33sl
187150418743041884204
T:
r5n13pke0smallct
189381718974241913869
T:
ledapkc34sl
190414219154581944567
T:
ledapkc5264
209322721230962159377
T:
ledapkc5364
222953022398962281926
T:
ledapkc5464
255034125664082597843
T:
ledapkc52sl
271820327240692761148
T:
ledapkc54sl
282445228404342869026
T:
ledapkc53sl
Cycles to decrypt 59 bytes
25%50%75%system
690906943069907
T:
r5nd1pke5d
942319485098026
T:
C:ntruees787ep1
100917101760102693
T:
r5nd1pke0d
116098116877117839
T:
lotus128
125659127291127814
T:
r5nd3pke5d
149819150164150705
T:
r5nd3pke0d
167627168394169127
T:
lotus192
192562193310200637
T:
r5nd5pke0d
210167212408213764
T:
r5nd5pke5d
235439237418239075
T:
lotus256
519281521037524817
T:
mcnie4q1281
537462538769544915
T:
r5n11pke0d
675740681382686358
T:
ronald1024
712351714108724867
T:
mcnie4q1282
738160740950744063
T:
mcnie3q1281
800438812533829967
T:
C:mceliece
872601874165880281
T:
mcnie4q1921
921501922697930427
T:
mcnie3q1282
103745010417131052233
T:
mcnie4q1922
107589410780981087627
T:
mcnie4q2561
109327910997041112278
T:
mcnie3q1921
127029912755301299684
T:
mcnie4q2562
127276912787641288522
T:
r5n13pke0d
133731113446831363766
T:
mcnie3q1922
147214214812401500315
T:
mcnie3q2561
156261615792461587986
T:
ledapkc1264
160226316047981608350
T:
r5n15pke0d
184100318541791865126
T:
ronald2048
194647819607161969108
T:
ledapkc1364
195484819649331973245
T:
ronald1536
195254119928752068747
T:
mcnie3q2562
201623620261112035810
T:
ledapkc1464
220655222143152221328
T:
ledapkc12sl
245474625212552541099
T:
ledapkc13sl
268463027177222742604
T:
ledapkc14sl
414601141604294177224
T:
ledapkc3264
432904843487314374041
T:
ronald3072
451978345496304661612
T:
ledapkc3464
454594345803344622195
T:
ledapkc3364
524008052508835277054
T:
ledapkc32sl
614804061789396202518
T:
ledapkc33sl
695739070029057023277
T:
ledapkc34sl
744490974870308222796
T:
r5n13pke0smallct
823941982646158297473
T:
ronald4096
915897991869609309179
T:
ledapkc5364
916849893589179477125
T:
ledapkc5264
100146771003554010068478
T:
ledapkc5464
127108611273354312759208
T:
ledapkc52sl
130104951305188813063422
T:
ledapkc54sl
132441221329192413363098
T:
ledapkc53sl