VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Sandy Bridge+AES (206a7); 2011 Intel Xeon E3-1225; 4 x 3100MHz; hydra7, supercop-20240625

[Page version: 20240720 10:46:07]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Implementation notes

Graphs: old (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
791948025881306
T:
r5nd1pke5d
106164106975107583
T:
r5nd1pke0d
156987158384163300
T:
r5nd3pke0d
158011159233160442
T:
r5nd3pke5d
210225211695213284
T:
r5nd5pke0d
276289278847288908
T:
r5nd5pke5d
101083961011078710112674
T:
r5n11pke0d
151576131518055315210997
T:
lotus128
195208251952607919532062
T:
r5n13pke0d
290080622903671029113721
T:
lotus192
342852733513881337347650
T:
C:mceliece
370256573702994237036684
T:
r5n15pke0d
487572754901734649210146
T:
mcnie4q1281
615202546181359662258167
T:
mcnie3q1281
625677806279476962834546
T:
lotus256
836613758419886084381585
T:
mcnie4q1282
894577989026561891403190
T:
mcnie3q1282
110775522110914983111023779
T:
mcnie4q1921
119292992119850667120481419
T:
mcnie3q1921
141550750141704537141867004
T:
mcnie4q2561
149010479149157078149345277
T:
mcnie4q1922
95049269?150808631?296614435?
T:
cargocult2048
164265064164877446165598049
T:
mcnie3q1922
179432411179990467180594296
T:
mcnie3q2561
194572789194747742194944366
T:
mcnie4q2562
121650060?199065218?339202384?
T:
rsa2048
294126047295091239296373104
T:
mcnie3q2562
349191314349212089349237568
T:
r5n13pke0smallct
537550655355599594685709179290
T:
pqrsa15
Cycles to encrypt 59 bytes
25%50%75%system
412104270944786
T:
rsa2048
419494280443942
T:
cargocult2048
446844507445601
T:
C:mceliece
143426144108145175
T:
r5nd1pke5d
203358205306206243
T:
r5nd1pke0d
269282270287271564
T:
r5nd3pke5d
298778300486304588
T:
r5nd3pke0d
336646338396339345
T:
lotus128
395777397546401171
T:
r5nd5pke0d
428424429701431088
T:
mcnie4q1281
440886443088462737
T:
r5nd5pke5d
502730503685505266
T:
lotus192
586926588852594815
T:
mcnie4q1282
712253715208719432
T:
mcnie4q1921
716201717682719432
T:
lotus256
858326860056863923
T:
mcnie4q1922
893936897446914626
T:
mcnie4q2561
103790010439921046105
T:
mcnie4q2562
116356311840481208565
T:
mcnie3q1281
143078214456971472446
T:
mcnie3q1282
181120518349861860614
T:
mcnie3q1921
218233822006452216859
T:
mcnie3q1922
253402525746672600748
T:
mcnie3q2561
324015532971603324920
T:
mcnie3q2562
554938855599795576391
T:
r5n13pke0smallct
917456292146949217986
T:
r5n11pke0d
177768511778616517793688
T:
r5n13pke0d
251466022516707225190876
T:
pqrsa15
334285463343518833444488
T:
r5n15pke0d
Cycles to decrypt 59 bytes
25%50%75%system
182401184048186335
T:
r5nd1pke5d
281913284217286433
T:
r5nd1pke0d
361991363565366513
T:
r5nd3pke5d
400694401360401780
T:
lotus128
419512420928422964
T:
r5nd3pke0d
562059564763567906
T:
r5nd5pke0d
612685622651641478
T:
r5nd5pke5d
635504636174637349
T:
lotus192
932375938210940214
T:
lotus256
117073911736231181647
T:
C:mceliece
118194111884531199760
T:
mcnie4q1281
151768315251251532927
T:
mcnie3q1281
162560616316551639542
T:
mcnie4q1282
188307418932621906634
T:
mcnie3q1282
196784419739071982458
T:
mcnie4q1921
226470823028062330873
T:
mcnie3q1921
234792023568592363943
T:
mcnie4q1922
242802624328602441920
T:
mcnie4q2561
266090626898382700925
T:
mcnie3q1922
286014328685552877537
T:
mcnie4q2562
292664129487862968779
T:
mcnie3q2561
346193534673653469018
T:
rsa2048
347335534751643476571
T:
cargocult2048
385216338865393906596
T:
mcnie3q2562
944947394883819490961
T:
r5n11pke0d
187051031871200518718488
T:
r5n13pke0d
196627821974103619748269
T:
r5n13pke0smallct
346048213461090834619306
T:
r5n15pke0d
179259745179359864179409818
T:
pqrsa15