VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Crestmont (a06a4-20); 2023 Intel Core Ultra 5 125H, E cores; 8 x 700MHz; meteor,little, supercop-20251222

[Page version: 20260208 14:17:42]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
631046376664937
T:
r5nd1pke5d
879069311994377
T:
r5nd1pke0d
133268135377142063
T:
r5nd3pke5d
133719135842137134
T:
r5nd3pke0d
175295177859180718
T:
r5nd5pke0d
241143252895255669
T:
r5nd5pke5d
473014477610484272
T:
C:ntruees401ep2
557375562647567972
T:
C:ntruees439ep1
767314772383780261
T:
r5n11pke0d
979991989201995498
T:
C:ntruees593ep1
147333114834901498029
T:
C:ntruees743ep1
158434315938801605704
T:
r5n13pke0d
200991120159322024322
T:
r5n15pke0d
248306424993822610986
T:
ledapkc1464
312295131281653311599
T:
ledapkc1364
326079632683263292333
T:
ledapkc1264
4003038?4274468?5526942?
T:
ledapkc14sl
3665257?4710221?5822393?
T:
ledapkc13sl
537421653894056108570
T:
ledapkc12sl
5783427?6401478?8396885?
T:
ledapkc3464
680743769307167368944
T:
ledapkc3364
742073075875177660759
T:
ledapkc3264
872691888032618968645
T:
ledapkc33sl
9371113962817310070018
T:
ledapkc34sl
977312698488359914943
T:
lotus128
107380831077365912071665
T:
ledapkc32sl
105553881092518612585602
T:
ledapkc5464
122352311264242212958951
T:
ledapkc5364
14562165?15312654?18450810?
T:
ledapkc54sl
182081951888340422520697
T:
ledapkc53sl
188760971895971819053189
T:
C:ntruees787ep1
176969891927030620950129
T:
ledapkc5264
219150412201497322338629
T:
lotus192
285975452875373130967033
T:
ledapkc52sl
309601353156201333523195
T:
C:mceliece
338209653387537933990271
T:
r5n13pke0smallct
338893673396130334056236
T:
mcnie4q1281
376155823788268938009816
T:
lotus256
440335494429543644688894
T:
mcnie3q1281
581265265822735358412691
T:
mcnie4q1282
631244666348775864029564
T:
mcnie3q1282
756751567580247675979470
T:
mcnie4q1921
826185358288106083304136
T:
mcnie3q1921
62728691?89086246?128799047?
T:
ronald1024
990314379918820599385617
T:
mcnie4q2561
101817255102003859102116976
T:
mcnie4q1922
112011461112385251112809146
T:
mcnie3q1922
121017152121465690122092228
T:
mcnie3q2561
131919013132154366132406148
T:
mcnie4q2562
194615929195235476195912718
T:
mcnie3q2562
308083392?455527473?573711170?
T:
ronald1536
601486524?898551314?1326475200?
T:
ronald2048
1620071283?2887672492?4680968681?
T:
ronald3072
-1450601266154192881018272838402
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
348573510735329
T:
C:ntruees401ep2
347003543035962
T:
ronald1024
398824005340433
T:
C:ntruees439ep1
482334888049536
T:
C:mceliece
516515242853341
T:
ronald1536
569955724957534
T:
C:ntruees593ep1
727027295073490
T:
C:ntruees743ep1
743417546476015
T:
ronald2048
104623105480106308
T:
C:ntruees787ep1
124711128482129927
T:
r5nd1pke5d
139462140632142217
T:
ronald3072
153155154556155808
T:
lotus128
171019172404174377
T:
r5nd1pke0d
228776230114232049
T:
ronald4096
230910231861232712
T:
lotus192
245604252416255165
T:
r5nd3pke5d
255711258063260818
T:
r5nd3pke0d
314939317098319252
T:
mcnie4q1281
326264330046336755
T:
lotus256
334231338822351278
T:
r5nd5pke0d
427763428830431201
T:
mcnie4q1282
422342430920433420
T:
r5nd5pke5d
527092528517532555
T:
mcnie4q1921
599859619865632175
T:
ledapkc1264
621085623082625695
T:
mcnie4q1922
665835666925672483
T:
mcnie4q2561
679360684788718556
T:
ledapkc1364
688663691728695723
T:
mcnie3q1281
685480705525727126
T:
ledapkc1464
735820746528791757
T:
ledapkc12sl
756043760901763856
T:
mcnie4q2562
772525782480814108
T:
ledapkc13sl
846836850492854605
T:
mcnie3q1282
890703896112899160
T:
r5n11pke0d
885993901052930993
T:
ledapkc14sl
105601710589581066714
T:
mcnie3q1921
116906912399791256161
T:
ledapkc3264
125659712592531264456
T:
mcnie3q1922
130455213343911381255
T:
ledapkc3364
136990413959981419003
T:
ledapkc3464
144117114446141449858
T:
mcnie3q2561
148252314926791557087
T:
ledapkc32sl
168160617307511755756
T:
ledapkc33sl
182035918237221827539
T:
mcnie3q2562
183573118467461861846
T:
r5n13pke0d
208115520963902128689
T:
ledapkc34sl
224157022600352328741
T:
ledapkc5264
231177223306182401503
T:
ledapkc5364
238043223911222402926
T:
r5n15pke0d
255438326077452634032
T:
ledapkc5464
271396027226222731059
T:
r5n13pke0smallct
303608230572333150117
T:
ledapkc52sl
317518232047223241451
T:
ledapkc53sl
320380532479713276896
T:
ledapkc54sl
Cycles to decrypt 59 bytes
25%50%75%system
375933779638088
T:
C:ntruees401ep2
422284237942905
T:
C:ntruees439ep1
618086233162880
T:
C:ntruees593ep1
829238337484001
T:
C:ntruees743ep1
125130125859127547
T:
C:ntruees787ep1
156493159146160598
T:
r5nd1pke5d
192252193675195209
T:
lotus128
221469221861223065
T:
r5nd1pke0d
289934290673291072
T:
lotus192
320336321352326349
T:
r5nd3pke5d
335299340504348441
T:
r5nd3pke0d
421699425003425567
T:
lotus256
453350461241470255
T:
r5nd5pke0d
569119575218582584
T:
r5nd5pke5d
721202734335742807
T:
C:mceliece
808428826383844652
T:
mcnie4q1281
9863559934041002621
T:
r5n11pke0d
110667211146241123152
T:
ronald1024
117127211870651210294
T:
mcnie4q1282
119066412030961224310
T:
mcnie3q1281
146423314796931506093
T:
mcnie3q1282
147664914925781512523
T:
mcnie4q1921
178987618050871827036
T:
mcnie4q1922
181833218342981863657
T:
mcnie3q1921
182627918434521862689
T:
mcnie4q2561
217677921968492222181
T:
mcnie4q2562
219029122061742219099
T:
r5n13pke0d
222467822459442270152
T:
mcnie3q1922
250840725218302532981
T:
mcnie3q2561
270274227050802707031
T:
ledapkc1264
278686328025012826394
T:
r5n15pke0d
300997030191563027986
T:
ledapkc1364
323682732439863262283
T:
ledapkc1464
325351232641163276373
T:
ronald1536
330694333480223367078
T:
mcnie3q2562
359358935976003603128
T:
ledapkc12sl
373201837391413748112
T:
ledapkc13sl
418212941955914200071
T:
ledapkc14sl
600679260223126034929
T:
ronald2048
750858975144427650138
T:
ledapkc3264
771505477483227756375
T:
ledapkc3364
815622581952098269584
T:
ledapkc3464
968412097396239911747
T:
ledapkc32sl
112885151130031811318220
T:
r5n13pke0smallct
114854471155378211661974
T:
ledapkc33sl
124315241247253512711721
T:
ledapkc34sl
156912661575039515934349
T:
ledapkc5264
174685011757806317940967
T:
ledapkc5364
176653201768080517702549
T:
ronald3072
206020272113496121239174
T:
ledapkc5464
225352792315736023369427
T:
ledapkc52sl
238407102455576424606463
T:
ledapkc53sl
257743212679801826894154
T:
ledapkc54sl
389326243897026238996403
T:
ronald4096