VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; K10 32nm (300f10); 2011 AMD A6-3650; 4 x 2600MHz; hydra4, supercop-20241022

[Page version: 20241215 22:59:14]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: old (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
137418138157140066
T:
r5nd1pke5d
202267203605205303
T:
r5nd1pke0d
319556321549324343
T:
r5nd3pke5d
320549322911324846
T:
r5nd3pke0d
433364437688442499
T:
r5nd5pke0d
606810612116614190
T:
r5nd5pke5d
130378291304040713042660
T:
r5n11pke0d
251057902511181925117696
T:
r5n13pke0d
377748223907301442550896
T:
C:mceliece
396676873972060539795374
T:
mcnie4q1281
473319504733663947343023
T:
r5n15pke0d
530321455331052953748870
T:
mcnie3q1281
679293516802450768116587
T:
mcnie4q1282
759064937620319977069106
T:
mcnie3q1282
806731808070327980728093
T:
ledapkc1464
875276388764797587856815
T:
mcnie4q1921
906652369080350691232316
T:
lotus192
929690589345985793494032
T:
ledapkc1364
981982469851999999084646
T:
mcnie3q1921
104320974104370758107361803
T:
ledapkc14sl
103143581104847696106727434
T:
ledapkc13sl
111399177111523812111649560
T:
mcnie4q2561
117860985118014492118114675
T:
mcnie4q1922
133117356133403484133896990
T:
mcnie3q1922
138060697138424669139052971
T:
mcnie3q2561
148426665148702402148826187
T:
lotus128
92864612?150314233?214938935?
T:
cargocult2048
93559539?151543309?257609279?
T:
ronald1024
153514604153673011154134849
T:
mcnie4q2562
103168740?163790510?261426268?
T:
rsa2048
166854752167281843167466425
T:
lotus256
216911152217907868218535656
T:
ledapkc1264
226691314227695426228475331
T:
mcnie3q2562
231676709232162329239815679
T:
ledapkc3464
274028428274281635274719459
T:
ledapkc34sl
283500799284340062285363486
T:
ledapkc12sl
298913552298998334299116567
T:
ledapkc3264
299636457300017397301732409
T:
ledapkc3364
334151697334250380334465323
T:
ledapkc5464
342151221342323657342828504
T:
ledapkc33sl
449933619449956597449985305
T:
r5n13pke0smallct
285621554?487417131?806690913?
T:
ronald1536
659442827660733077660912546
T:
ledapkc5364
770263230771405253775137597
T:
ledapkc54sl
837324502839137054840917665
T:
ledapkc32sl
865086500866998518869651596
T:
ledapkc5264
880145553881962609887250633
T:
ledapkc53sl
481622740?940944130?1412694459?
T:
ronald2048
193195535719327060511935773158
T:
ledapkc52sl
1528980365?2226135049?4334368664?
T:
ronald3072
566558783358270749525987729194
T:
pqrsa15
4176713276?6988720369?9600122689?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
383594005042155
T:
rsa2048
383204134544472
T:
cargocult2048
512905196753020
T:
C:mceliece
699507017184250
T:
ronald1024
8923792567104768
T:
ronald1536
114639128692130256
T:
ronald2048
183374197514211938
T:
ronald3072
238251239602240810
T:
r5nd1pke5d
289507293059307885
T:
ronald4096
390830392945396195
T:
r5nd1pke0d
430591431284432055
T:
mcnie4q1281
529790532223535481
T:
r5nd3pke5d
576452578664579811
T:
mcnie4q1282
617909623591627987
T:
r5nd3pke0d
702581703249704525
T:
mcnie4q1921
829813832977834332
T:
mcnie4q1922
844095852126860745
T:
r5nd5pke0d
859207859888860959
T:
mcnie4q2561
860303865100869640
T:
mcnie3q1281
986662989635993794
T:
r5nd5pke5d
9957439974111000995
T:
mcnie4q2562
106010810657851067625
T:
mcnie3q1282
130530113076271309496
T:
mcnie3q1921
156291815644981566448
T:
mcnie3q1922
168964116950771708844
T:
lotus192
177180617748111776099
T:
mcnie3q2561
226358822724592279940
T:
mcnie3q2562
240870924174482425705
T:
lotus256
336202333658793618471
T:
lotus128
671468967176776720733
T:
r5n13pke0smallct
104143801041655510418743
T:
ledapkc1364
104162601042085410424440
T:
ledapkc13sl
119085481191268111923689
T:
ledapkc1264
119614481196789511969917
T:
r5n11pke0d
138150021391426413918968
T:
ledapkc1464
140890731414054614146001
T:
ledapkc12sl
154443211545186615455388
T:
ledapkc14sl
156361611564695115703900
T:
ledapkc3264
230729602307684523079923
T:
r5n13pke0d
270282612709683127135514
T:
pqrsa15
274556662766722127688305
T:
ledapkc3364
338813433391848333921433
T:
ledapkc3464
345160983452697034535436
T:
ledapkc33sl
390077483901608439018706
T:
ledapkc32sl
440393534404958244069349
T:
ledapkc34sl
441148754412172244126527
T:
r5n15pke0d
447157414475514944766042
T:
ledapkc5264
510419115105173251057612
T:
ledapkc5464
622152256223410862266655
T:
ledapkc5364
834150018346264883998730
T:
ledapkc53sl
889931478900128289028833
T:
ledapkc52sl
102522003102572343102807673
T:
ledapkc54sl
Cycles to decrypt 59 bytes
25%50%75%system
336702339460341324
T:
r5nd1pke5d
580123581063583096
T:
r5nd1pke0d
747008748260748622
T:
r5nd3pke5d
919589920697929844
T:
r5nd3pke0d
99485910156701018544
T:
C:mceliece
113457111383441143763
T:
mcnie4q1281
125703312655261266937
T:
r5nd5pke0d
141376214149561417519
T:
r5nd5pke5d
149337415100781523319
T:
ronald1024
152985015368171542159
T:
mcnie4q1282
157451315815881589893
T:
mcnie3q1281
186271118727501878662
T:
mcnie4q1921
194656219647671976241
T:
mcnie3q1282
215624121685222177515
T:
mcnie4q1922
222311022318862240153
T:
mcnie4q2561
228059622933902302258
T:
lotus192
233727123478652355217
T:
mcnie3q1921
259646326024252608334
T:
mcnie4q2562
281198628182432824396
T:
mcnie3q1922
301702130221873029632
T:
mcnie3q2561
320537732075813207844
T:
cargocult2048
320544532156443216232
T:
rsa2048
337528233782093396211
T:
lotus256
397668639966434011912
T:
ronald1536
399177139971564051334
T:
mcnie3q2562
425852444808324507530
T:
lotus128
678931668217496846362
T:
ronald2048
872496587268718732042
T:
ledapkc1264
987389998825029888720
T:
ledapkc1364
99855661003294410058963
T:
ledapkc12sl
120233041203269812036405
T:
ledapkc1464
122573861226499512266358
T:
r5n11pke0d
129521551300260113029600
T:
ledapkc13sl
139944591406024114101715
T:
ledapkc14sl
187976401884030918879215
T:
ronald3072
207017122076088020812421
T:
r5n13pke0smallct
234909042349881223550108
T:
ledapkc3264
240319992403505024039096
T:
r5n13pke0d
250864352508971725129712
T:
ledapkc3364
291932812932178129762486
T:
ledapkc3464
294798482949852829681032
T:
ledapkc32sl
360304543607049136125615
T:
ledapkc33sl
378935183791913238041709
T:
ledapkc34sl
396625833972198639790749
T:
ronald4096
452256594523020945244701
T:
r5n15pke0d
457233774573930745816711
T:
ledapkc5264
556142885562549855661106
T:
ledapkc5364
643726566441970464530987
T:
ledapkc52sl
672206456728295967373218
T:
ledapkc5464
727146937278206672945719
T:
ledapkc53sl
865154228658307386613594
T:
ledapkc54sl
184423628184690174185048269
T:
pqrsa15