VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Golden Cove (90675-00); 2022 Intel Core i3-12100; 4 x 3300MHz; alder, supercop-20250922

[Page version: 20251005 01:31:26]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
335411338366340775
T:
C:ntruees401ep2
414022417062420096
T:
C:ntruees439ep1
678996682079686170
T:
C:ntruees593ep1
99739010010051007058
T:
C:ntruees743ep1
614779261566626188284
T:
lotus128
125402831254573112558277
T:
lotus192
204222912044823420656960
T:
lotus256
214280202146773721533377
T:
mcnie4q1281
222557152232422222394104
T:
C:ntruees787ep1
297277643018989030850360
T:
mcnie3q1281
300020063052097831515822
T:
C:mceliece
369427333809170638990135
T:
mcnie4q1282
418443684284867243484332
T:
mcnie3q1282
515063285211348453072747
T:
mcnie4q1921
39930632?52333265?76026818?
T:
ronald1024
529631005323611653645115
T:
mcnie3q1921
631375786370924964529529
T:
mcnie4q2561
42653431?68090219?106387322?
T:
rsa2048
683583946958407170684582
T:
mcnie4q1922
717218047209605772598935
T:
mcnie3q1922
48526323?72291030?113447432?
T:
cargocult2048
794121138029896081835998
T:
mcnie3q2561
857674588675593387640681
T:
mcnie4q2562
124447261124832131125539085
T:
mcnie3q2562
165194872?221238720?287690198?
T:
ronald1536
269558417?419341272?670645386?
T:
ronald2048
858679250?1123369385?1825975232?
T:
ronald3072
2150178089?3158099902?5024976380?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
149101528215975
T:
cargocult2048
150801568316346
T:
rsa2048
257242609726693
T:
ronald1024
292242958229972
T:
C:ntruees401ep2
338563414935024
T:
ronald1536
389543924339724
T:
C:ntruees439ep1
447384588646964
T:
ronald2048
461854673147438
T:
C:mceliece
547585528755894
T:
C:ntruees593ep1
697797032270874
T:
C:ntruees743ep1
764327726578481
T:
ronald3072
853848592686600
T:
C:ntruees787ep1
932869365794127
T:
lotus128
120738121898123217
T:
ronald4096
134801135296135849
T:
lotus192
188659189002189620
T:
lotus256
221159221813222969
T:
mcnie4q1281
339361341140342746
T:
mcnie4q1282
381902383691391999
T:
mcnie4q1921
447559450700461150
T:
mcnie4q1922
470345476714481481
T:
mcnie4q2561
481125486195509987
T:
mcnie3q1281
539449547101562262
T:
mcnie4q2562
590842628366632497
T:
mcnie3q1282
699056701246703200
T:
mcnie3q1921
832555834114837746
T:
mcnie3q1922
978633988896992498
T:
mcnie3q2561
123125612342191237721
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
294452970830287
T:
C:ntruees401ep2
410514156941868
T:
C:ntruees439ep1
575745801058983
T:
C:ntruees593ep1
788997946580270
T:
C:ntruees743ep1
102416102826112912
T:
C:ntruees787ep1
109031109130109249
T:
lotus128
163704164121164707
T:
lotus192
233428233701234071
T:
lotus256
621334627131641118
T:
mcnie4q1281
614480629328636321
T:
C:mceliece
665663671497677284
T:
ronald1024
904121919724949125
T:
mcnie4q1282
939682947802970131
T:
mcnie3q1281
116810511800151209111
T:
mcnie3q1282
117623911925331215758
T:
mcnie4q1921
139782514075291435862
T:
mcnie4q1922
144391314502381457857
T:
mcnie3q1921
143791614559891481263
T:
mcnie4q2561
158695715902221593824
T:
cargocult2048
158942215918461595860
T:
rsa2048
169597217051341722919
T:
mcnie4q2562
171807417257321732344
T:
mcnie3q1922
173634517459511752618
T:
ronald1536
189778119100471920260
T:
mcnie3q2561
247190924801182528682
T:
mcnie3q2562
282689628353392844033
T:
ronald2048
759401776095557622211
T:
ronald3072
162796421630094316322284
T:
ronald4096