VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; K10 45nm (100f63); 2010 AMD Athlon II Neo K125; 1 x 1700MHz; h3neo, supercop-20250415

[Page version: 20250523 10:17:43]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: old (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
122907712332071239604
T:
C:ntruees401ep2
145259014594251465796
T:
C:ntruees439ep1
244897824574102466789
T:
C:ntruees593ep1
369843137058933717301
T:
C:ntruees743ep1
392038644101212943038008
T:
C:mceliece
436421064374108043821473
T:
mcnie4q1281
552837095547170155600292
T:
lotus128
583741025870237059348749
T:
mcnie3q1281
747937777492356375084822
T:
mcnie4q1282
831058308373500984672666
T:
mcnie3q1282
960287339638795196596553
T:
mcnie4q1921
960028969638859996660402
T:
C:ntruees787ep1
105896661106428515107847981
T:
lotus192
106999387107709785108291889
T:
mcnie3q1921
87193461?111712103?160351092?
T:
ronald1024
78144148?116475580?191189486?
T:
cargocult2048
121802203122155317122412258
T:
mcnie4q2561
128555883129489740129946484
T:
mcnie4q1922
145038512145927604146686645
T:
mcnie3q1922
149318270150017625150689498
T:
mcnie3q2561
94528673?159350352?252591563?
T:
rsa2048
168269072168641644168984931
T:
mcnie4q2562
215424921215809792216227946
T:
lotus256
247369707249179243250300729
T:
mcnie3q2562
356816765?482294875?734126934?
T:
ronald1536
1193589434?1949884901?2907517109?
T:
ronald2048
3634983923?5457270095?7913107179?
T:
ronald3072
8717734476?15028764622?24645935394?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
493245031455602
T:
rsa2048
491505385258011
T:
cargocult2048
556635635157171
T:
C:mceliece
599246013062470
T:
ronald1024
735987405074588
T:
C:ntruees401ep2
797568043281121
T:
C:ntruees439ep1
814698168589534
T:
ronald1536
109650117380119607
T:
ronald2048
120844121538122366
T:
C:ntruees593ep1
159664161079163157
T:
C:ntruees743ep1
188601195113201407
T:
ronald3072
249580250227250881
T:
C:ntruees787ep1
296993304655306777
T:
ronald4096
431708432858434943
T:
mcnie4q1281
576405576991579285
T:
mcnie4q1282
704304707685714927
T:
mcnie4q1921
753268757907770263
T:
lotus128
834539835843845891
T:
mcnie4q1922
860543862013872351
T:
mcnie4q2561
881637882778884964
T:
mcnie3q1281
100619910070831008137
T:
mcnie4q2562
108804510905321094012
T:
mcnie3q1282
116459211704761180775
T:
lotus192
133008413318351335751
T:
mcnie3q1921
160063616042751612852
T:
mcnie3q1922
172720717323891737472
T:
lotus256
179002517937421796431
T:
mcnie3q2561
230920123118562314931
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
101071102030102783
T:
C:ntruees401ep2
110307111355113527
T:
C:ntruees439ep1
170161171008173066
T:
C:ntruees593ep1
234768235491238092
T:
C:ntruees743ep1
432874433709434330
T:
C:ntruees787ep1
9207009242401039443
T:
lotus128
101891810295931031043
T:
C:mceliece
116338811736461179977
T:
mcnie4q1281
152151115295961543032
T:
lotus192
158451715951621607036
T:
ronald1024
160545816108451617475
T:
mcnie4q1282
161143816172151625749
T:
mcnie3q1281
196342919756751985819
T:
mcnie4q1921
200504620210202029067
T:
mcnie3q1282
223827522431242247612
T:
lotus256
227439522890942296317
T:
mcnie4q1922
231105023288942347370
T:
mcnie4q2561
239595524046512412199
T:
mcnie3q1921
268701726972882711225
T:
mcnie4q2562
285557828729182885390
T:
mcnie3q1922
307026230771383083367
T:
mcnie3q2561
318167331877143252307
T:
cargocult2048
319163531985913199299
T:
rsa2048
405625841019004134949
T:
mcnie3q2562
422676842414484261335
T:
ronald1536
727453572989217322616
T:
ronald2048
200179382004672320097359
T:
ronald3072
418239544188276841944699
T:
ronald4096