VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Gracemont (906a4-20); 2022 Intel Core i3-1215U, E cores; 4 x 1600MHz; alder2,1f626960,3300000, supercop-20250415

[Page version: 20250506 12:42:46]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
736097441975263
T:
r5nd1pke5d
99781102299106988
T:
r5nd1pke0d
142632143504144825
T:
r5nd3pke0d
151077153293157514
T:
r5nd3pke5d
183381186717189569
T:
r5nd5pke0d
270552277273282040
T:
r5nd5pke5d
497581503337508315
T:
C:ntruees401ep2
593853598933606431
T:
C:ntruees439ep1
893056895695900378
T:
r5n11pke0d
103763710449771052819
T:
C:ntruees593ep1
156010915709171587046
T:
C:ntruees743ep1
188506218913711901786
T:
r5n13pke0d
247284324810492490327
T:
r5n15pke0d
319545733052163591616
T:
ledapkc1464
349209835536703686586
T:
ledapkc1364
360708936820034047183
T:
ledapkc1264
4801726?5075956?7040086?
T:
ledapkc14sl
4132889?5387365?5870698?
T:
ledapkc13sl
581392059914326523980
T:
ledapkc12sl
733160074890617583828
T:
ledapkc3364
813820881548738530056
T:
ledapkc3264
8535518?8995038?11998746?
T:
ledapkc3464
106135991095719011266349
T:
ledapkc33sl
121631671273095914529566
T:
ledapkc32sl
134357651383111314658494
T:
ledapkc5364
11367621?14183410?16590259?
T:
ledapkc34sl
141037591516938716744294
T:
ledapkc5464
166611731680711617311925
T:
lotus128
190375871956685122241268
T:
ledapkc5264
19487839?20742734?28758399?
T:
ledapkc54sl
204736862155062324540462
T:
ledapkc53sl
269769222703110327095104
T:
C:ntruees787ep1
312415633189962233314875
T:
C:mceliece
299990253285944435133191
T:
ledapkc52sl
331464193355486533866729
T:
lotus192
352752273537142035623203
T:
mcnie4q1281
394897574021471642130769
T:
r5n13pke0smallct
477757514801467648413312
T:
mcnie3q1281
564799615744392258045072
T:
lotus256
603727656044110060521652
T:
mcnie4q1282
681774576865378469137061
T:
mcnie3q1282
47148808?73396353?104327730?
T:
ronald1024
801366128023128780345948
T:
mcnie4q1921
902979609067243091145599
T:
mcnie3q1921
104729638104812673104915677
T:
mcnie4q2561
107784418107894587108027949
T:
mcnie4q1922
121041703121417273121933872
T:
mcnie3q1922
128315407128632731129081398
T:
mcnie3q2561
140355973140504815140642226
T:
mcnie4q2562
206224139206604186207060306
T:
mcnie3q2562
140261987?247358299?395701654?
T:
ronald1536
289795523?486441157?819849921?
T:
ronald2048
1183609381?1935611870?3140248283?
T:
ronald3072
4175519292?6600694212?9500681631?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
377003825640106
T:
ronald1024
386923911839692
T:
C:ntruees401ep2
445474479545095
T:
C:ntruees439ep1
478194838348897
T:
C:mceliece
535215415756366
T:
ronald1536
615076176862125
T:
C:ntruees593ep1
785137884879260
T:
C:ntruees743ep1
771327949680938
T:
ronald2048
105637106259106814
T:
C:ntruees787ep1
135753136619140058
T:
r5nd1pke5d
142746144798147771
T:
ronald3072
183443185885190516
T:
r5nd1pke0d
234261237074240218
T:
ronald4096
271377273391279035
T:
r5nd3pke5d
289599294008296936
T:
r5nd3pke0d
308126308961310142
T:
mcnie4q1281
297724?318239?389315?
T:
lotus128
374536379678385447
T:
r5nd5pke0d
420506421425422544
T:
mcnie4q1282
454304457852469382
T:
r5nd5pke5d
545329546502547492
T:
mcnie4q1921
488446?550917?610598?
T:
lotus192
618081619740621075
T:
ledapkc1264
646971647896649145
T:
mcnie4q1922
686315686904688068
T:
mcnie4q2561
702487704259707813
T:
mcnie3q1281
733520735987737885
T:
ledapkc1364
757305758776760761
T:
mcnie4q2562
757771772645837583
T:
ledapkc1464
790628791818812223
T:
ledapkc12sl
857279860128864934
T:
mcnie3q1282
857556863234877672
T:
ledapkc13sl
8095598679141005215
T:
lotus256
101568110196511025804
T:
ledapkc14sl
106024410619121074561
T:
mcnie3q1921
109505411008261104992
T:
r5n11pke0d
125860412607151264373
T:
mcnie3q1922
128604012933051316172
T:
ledapkc3264
144556214468801449614
T:
mcnie3q2561
146296314698011499506
T:
ledapkc3364
156392015919211619588
T:
ledapkc3464
156947915978591709262
T:
ledapkc32sl
184438018475741860625
T:
mcnie3q2562
184825818687361912677
T:
ledapkc33sl
219654222200472241354
T:
ledapkc34sl
222624322387532249044
T:
r5n13pke0d
236908224024602460440
T:
ledapkc5264
253843125467322557836
T:
ledapkc5364
287383729317692947784
T:
ledapkc5464
293311429582343012673
T:
r5n15pke0d
304616532377863287908
T:
r5n13pke0smallct
328504933196583338497
T:
ledapkc52sl
342261534353693482221
T:
ledapkc54sl
343161734872693528732
T:
ledapkc53sl
Cycles to decrypt 59 bytes
25%50%75%system
426274281743379
T:
C:ntruees401ep2
487104902349352
T:
C:ntruees439ep1
690976923070145
T:
C:ntruees593ep1
923709290093662
T:
C:ntruees743ep1
134068137939138987
T:
C:ntruees787ep1
195587198268204321
T:
r5nd1pke5d
271333273463275235
T:
r5nd1pke0d
396939403280408848
T:
r5nd3pke5d
428499431178438534
T:
r5nd3pke0d
460265471401527294
T:
lotus128
562016565630567335
T:
r5nd5pke0d
665628672830682532
T:
r5nd5pke5d
668278743116752918
T:
C:mceliece
703379831224853628
T:
lotus192
916301922005929267
T:
mcnie4q1281
110708011149141120364
T:
ronald1024
121075512134651217242
T:
r5n11pke0d
114316712211011404989
T:
lotus256
126553812726501280416
T:
mcnie4q1282
127499112869441301925
T:
mcnie3q1281
156988315764621585701
T:
mcnie4q1921
158707015929671604914
T:
mcnie3q1282
186885218747211883518
T:
mcnie4q1922
190184519120561922636
T:
mcnie4q2561
193174319424421964826
T:
mcnie3q1921
221617222229622231122
T:
mcnie4q2562
227625222963272307141
T:
mcnie3q1922
250769025198542538290
T:
mcnie3q2561
275032827665602773615
T:
ledapkc1264
278176627935992843456
T:
r5n13pke0d
299637630296833046927
T:
ledapkc1364
326757932785883287110
T:
ronald1536
328984033016883328588
T:
mcnie3q2562
336211533840273483817
T:
ledapkc1464
354191935829903629692
T:
r5n15pke0d
382131538294174030606
T:
ledapkc12sl
385119238993054140522
T:
ledapkc13sl
425773843584934382724
T:
ledapkc14sl
598930760007456016828
T:
ronald2048
851209985835148792383
T:
ledapkc3464
867529888658699223918
T:
ledapkc3264
93534631004530411070133
T:
ledapkc3364
118730531197164514685901
T:
ledapkc32sl
133509621348823313528280
T:
r5n13pke0smallct
133835431365733214303087
T:
ledapkc33sl
142526541434393814567261
T:
ledapkc34sl
175028451752968217568341
T:
ronald3072
192715051972864921090476
T:
ledapkc5264
223373912279112323928627
T:
ledapkc5364
266893542762217428952954
T:
ledapkc5464
285214182886253329282170
T:
ledapkc52sl
307714993184670234537545
T:
ledapkc53sl
341340123558455237243925
T:
ledapkc54sl
388538283889681938992542
T:
ronald4096