VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Zen 4 (a60f12); 2023 AMD Ryzen 7 7700; 8 x 3800MHz; hertz, supercop-20251222

[Page version: 20260215 12:16:28]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements (or StQ1 starting with supercop-20260214), the median of many speed measurements (or StQ2 starting with supercop-20260214), the third quartile of many speed measurements (or StQ3 starting with supercop-20260214), and the name of the primitive. Measurements with large interquartile range (or stabilized interquartile range) are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
399344050841257
T:
r5nd1pke5d
533205409655418
T:
r5nd1pke0d
711427185072726
T:
r5nd3pke0d
709457191173114
T:
r5nd3pke5d
852538608387081
T:
r5nd5pke0d
119420120854122403
T:
r5nd5pke5d
387567388877390383
T:
r5n11pke0d
884629887820891040
T:
r5n13pke0d
112555011337291138557
T:
r5n15pke0d
280441528095442815516
T:
ledapkc1464
327454532802643298204
T:
ledapkc1364
347604134809973497172
T:
ledapkc1264
4126178?4135856?5669415?
T:
ledapkc14sl
4254577?4288622?5371346?
T:
ledapkc13sl
580103758642306529207
T:
ledapkc12sl
5867840?5899892?8437385?
T:
ledapkc3464
727949373366127357275
T:
ledapkc3364
747109474761357484106
T:
lotus128
8516004853435710545077
T:
ledapkc33sl
883752988440908852014
T:
ledapkc3264
940077794086929436228
T:
ledapkc34sl
985187098640249876241
T:
ledapkc5464
118777051200790113238883
T:
ledapkc32sl
124126081241934812437862
T:
ledapkc5364
137552011376760513791672
T:
ledapkc54sl
143339291434056814355609
T:
lotus192
156389711571669115762183
T:
C:ntruees787ep1
183674921839717021561729
T:
ledapkc53sl
180873151842955120071200
T:
ledapkc5264
197297282040168720519229
T:
r5n13pke0smallct
227806222282194122869320
T:
mcnie4q1281
242929792431247824379650
T:
lotus256
253772852638262527041084
T:
C:mceliece
304470233075567131114305
T:
mcnie3q1281
299853013188709432634270
T:
ledapkc52sl
391009943917281639282664
T:
mcnie4q1282
434147904366308844086106
T:
mcnie3q1282
33651626?45363035?69801334?
T:
ronald1024
504581705052622650628285
T:
mcnie4q1921
565396825679845857224774
T:
mcnie3q1921
655293326566352365732314
T:
mcnie4q2561
692999946939838269472005
T:
mcnie4q1922
764434877672925277175348
T:
mcnie3q1922
812488968145875681826805
T:
mcnie3q2561
894248198954824489663153
T:
mcnie4q2562
131453653131839790132392313
T:
mcnie3q2562
163543926?257966594?357649535?
T:
ronald1536
320252260?427062956?661709664?
T:
ronald2048
992048333?1436030159?2012272958?
T:
ronald3072
2669500975?3820626863?6363988505?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
245502468725814
T:
ronald1024
330383341434220
T:
ronald1536
380903841038863
T:
C:mceliece
446784582246741
T:
ronald2048
758417646777086
T:
r5nd1pke5d
772767825380039
T:
C:ntruees787ep1
775297846179585
T:
ronald3072
975029807198985
T:
r5nd1pke0d
103132103894104380
T:
lotus128
121212122615124005
T:
ronald4096
129142129900131034
T:
r5nd3pke5d
131375131942132777
T:
r5nd3pke0d
146202146955153913
T:
lotus192
160107160859161517
T:
r5nd5pke0d
201201203079218158
T:
lotus256
207255208802210924
T:
r5nd5pke5d
233642234784235846
T:
mcnie4q1281
321865322786324016
T:
mcnie4q1282
388904390168395597
T:
mcnie4q1921
482035482841483722
T:
r5n11pke0d
482673484616486493
T:
mcnie4q2561
489377490617492472
T:
mcnie4q1922
489755490637491625
T:
mcnie3q1281
562564563472564848
T:
mcnie4q2562
586434591609603683
T:
ledapkc1264
590914592002594016
T:
mcnie3q1282
689950694353712025
T:
ledapkc1364
710700714969727442
T:
ledapkc12sl
724749725967731835
T:
ledapkc1464
746726747836749160
T:
mcnie3q1921
800696803585808941
T:
ledapkc13sl
873614875190877686
T:
mcnie3q1922
912200915892936018
T:
ledapkc14sl
101104110126111014197
T:
mcnie3q2561
108223210862991092283
T:
r5n13pke0d
109124110982441121684
T:
ledapkc3264
125896812665361294708
T:
ledapkc3364
129265612949431297471
T:
mcnie3q2562
129756813007111307668
T:
ledapkc3464
130544313094981337895
T:
ledapkc32sl
141597014230621440905
T:
r5n15pke0d
152287315278731571158
T:
ledapkc33sl
187896718882991937505
T:
r5n13pke0smallct
189988519044641964427
T:
ledapkc34sl
189795119095431958519
T:
ledapkc5264
209599321139262164856
T:
ledapkc5364
224010422442352282495
T:
ledapkc5464
254566625551512603443
T:
ledapkc52sl
271195627221842731511
T:
ledapkc54sl
280545728442752892819
T:
ledapkc53sl
Cycles to decrypt 59 bytes
25%50%75%system
702387183572149
T:
r5nd1pke5d
9215797916100085
T:
C:ntruees787ep1
100009100427100935
T:
r5nd1pke0d
116337117159117748
T:
lotus128
125013125499126329
T:
r5nd3pke5d
150499151024159051
T:
r5nd3pke0d
169020169720175992
T:
lotus192
192721193188193621
T:
r5nd5pke0d
212260214907215882
T:
r5nd5pke5d
234556235459264158
T:
lotus256
536125537187537956
T:
r5n11pke0d
556959558859562118
T:
mcnie4q1281
675484679375685213
T:
ronald1024
754832756908760194
T:
mcnie3q1281
776014784479800002
T:
mcnie4q1282
822135829318832301
T:
C:mceliece
903552912543923848
T:
mcnie4q1921
929072932668939865
T:
mcnie3q1282
109761611003531106760
T:
mcnie4q1922
111548911199661129466
T:
mcnie4q2561
113464511442211159178
T:
mcnie3q1921
126829212808911334590
T:
r5n13pke0d
132407413422211378972
T:
mcnie4q2562
138596613923511419260
T:
mcnie3q1922
153536315420301554836
T:
mcnie3q2561
156606515807741588769
T:
ledapkc1264
160538316119571618854
T:
r5n15pke0d
184987018613441875713
T:
ronald2048
196435119720851982910
T:
ronald1536
195892719756281988657
T:
ledapkc1364
202568220313252038612
T:
ledapkc1464
206246521067802147339
T:
mcnie3q2562
220083422073852219852
T:
ledapkc12sl
243971124718172486966
T:
ledapkc13sl
266379226674952685644
T:
ledapkc14sl
412123941444304152421
T:
ledapkc3264
434011743533964381851
T:
ronald3072
453823145825714593630
T:
ledapkc3464
456671045946474604392
T:
ledapkc3364
527814652974705316592
T:
ledapkc32sl
615450561624106201733
T:
ledapkc33sl
693713769964847014959
T:
ledapkc34sl
746153375021408352662
T:
r5n13pke0smallct
823541382640458293057
T:
ronald4096
899325990787949115122
T:
ledapkc5264
915546891706759213635
T:
ledapkc5364
99740321003220810039303
T:
ledapkc5464
127391201279681612812844
T:
ledapkc52sl
129210101293744012997987
T:
ledapkc54sl
131646681330304513387921
T:
ledapkc53sl