VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Tremont (906c0); 2021 Intel Pentium Silver N6000; 4 x 1100MHz; jasper, supercop-20241022

[Page version: 20241120 00:41:14]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
874878815389066
T:
r5nd1pke5d
119180119726120716
T:
r5nd1pke0d
173077173722174834
T:
r5nd3pke0d
181481183508185071
T:
r5nd3pke5d
216954218009219839
T:
r5nd5pke0d
312321316119317955
T:
r5nd5pke5d
231492042315518623158149
T:
r5n11pke0d
322719043309415534608843
T:
C:mceliece
403362984047178140757772
T:
lotus192
411757224118003941188751
T:
r5n13pke0d
455025894557775845650005
T:
mcnie4q1281
608402676109777961414097
T:
mcnie3q1281
614848006258836262846839
T:
ledapkc1464
633265836354391963713955
T:
mcnie4q1282
692191426994699870651286
T:
lotus256
756771357598400076104997
T:
ledapkc1364
788857707889078678896277
T:
r5n15pke0d
808524268216980182703979
T:
ledapkc13sl
870904468759317588000892
T:
mcnie3q1282
878721488850384690130751
T:
ledapkc14sl
51704820?88507446?127895653?
T:
ronald1024
102020600102116771102287442
T:
mcnie4q1921
101948342102329007102934842
T:
mcnie3q1921
109404899109778316110102105
T:
mcnie4q2561
112206287112689782113138790
T:
mcnie4q1922
151076843151737669152323817
T:
mcnie4q2562
154859291155320167156057655
T:
mcnie3q2561
154997115155384937155969024
T:
mcnie3q1922
107981121?167026808?301950173?
T:
rsa2048
182335260182709211183705319
T:
ledapkc1264
193993292194376045198297600
T:
ledapkc3464
212573990213396502219067714
T:
ledapkc12sl
219980242220667093221948305
T:
ledapkc34sl
224465033224628082225096930
T:
ledapkc3264
228819393229192305234128537
T:
ledapkc3364
139972223?234976210?383502736?
T:
cargocult2048
134733754?245527006?399948105?
T:
ronald1536
254985712255364266255932063
T:
ledapkc5464
254523001255912640257398128
T:
mcnie3q2562
262167173263354130265064753
T:
ledapkc33sl
274516611274575027276175296
T:
lotus128
520999766522853866524263700
T:
ledapkc5364
267070333?551578615?943019320?
T:
ronald2048
659667917661703975667150711
T:
ledapkc32sl
659825286667674088698291249
T:
ledapkc54sl
683806316688091866720910132
T:
ledapkc53sl
696729087699952327701740078
T:
ledapkc5264
741906027741939521741986135
T:
r5n13pke0smallct
150934603515196582341536629610
T:
ledapkc52sl
1113006116?1881652316?3308026571?
T:
ronald3072
2815629143?5611264242?8882926320?
T:
ronald4096
565502138757831398575910895472
T:
pqrsa15
Cycles to encrypt 59 bytes
25%50%75%system
295593099232432
T:
rsa2048
307053179734036
T:
cargocult2048
429424388045102
T:
ronald1024
434644406044416
T:
C:mceliece
598756023863744
T:
ronald1536
813938405985447
T:
ronald2048
143288144175147964
T:
r5nd1pke5d
142787145594149607
T:
ronald3072
195072195618196224
T:
r5nd1pke0d
223311225745229662
T:
ronald4096
274940277584279435
T:
r5nd3pke5d
288143288844289527
T:
r5nd3pke0d
364462365561370515
T:
r5nd5pke0d
408218409351410458
T:
mcnie4q1281
451215454224457502
T:
r5nd5pke5d
648268653233666626
T:
mcnie4q1282
684329685916687568
T:
mcnie4q1921
879603884452889903
T:
mcnie3q1281
931430939792956106
T:
mcnie4q1922
982578989254995498
T:
mcnie4q2561
109164510935581096820
T:
mcnie3q1282
108983610955081119178
T:
lotus192
113105211391881156128
T:
mcnie4q2562
157399715915551620769
T:
lotus256
162450316347201638896
T:
mcnie3q1922
159887716388771655984
T:
mcnie3q1921
208536921408202253843
T:
mcnie3q2561
278832228884032933078
T:
mcnie3q2562
351149135145183517769
T:
lotus128
758443475936437609080
T:
r5n13pke0smallct
805550281063088136176
T:
ledapkc13sl
839570884256288433265
T:
ledapkc1364
973376097763299788081
T:
ledapkc1264
104563461046867610499141
T:
ledapkc12sl
106135931062316410632768
T:
ledapkc1464
116329971170507911712638
T:
ledapkc3264
129369931296649213217554
T:
ledapkc14sl
178485891785026717860361
T:
r5n11pke0d
212368892126610621282599
T:
ledapkc3364
264893632652280326613186
T:
ledapkc33sl
283755862839164728410075
T:
ledapkc3464
306128423063287230652634
T:
ledapkc32sl
344209003442673934431870
T:
r5n13pke0d
356376363575277636037493
T:
ledapkc34sl
360755453610503036147727
T:
ledapkc5264
397523093982816840869814
T:
ledapkc5464
497821554985135049922588
T:
ledapkc5364
568461175696752257046819
T:
pqrsa15
648276366483320564837581
T:
r5n15pke0d
656093196583623665951413
T:
ledapkc53sl
695504316966065969726866
T:
ledapkc52sl
876698538830093388477221
T:
ledapkc54sl
Cycles to decrypt 59 bytes
25%50%75%system
204077206117208212
T:
r5nd1pke5d
289657290945292461
T:
r5nd1pke0d
408429410343411699
T:
r5nd3pke5d
431267431840432945
T:
r5nd3pke0d
547322549419554536
T:
r5nd5pke0d
690937694429698097
T:
r5nd5pke5d
768320772930777721
T:
C:mceliece
113031911330351139737
T:
mcnie4q1281
119841812104851219368
T:
ronald1024
133525813458941356883
T:
mcnie4q1282
146883014829511523777
T:
lotus192
155946515663561577743
T:
mcnie3q1281
188355218897831896781
T:
mcnie4q1921
190443919130081928873
T:
mcnie4q1922
192605719375001949133
T:
mcnie4q2561
196007319671591975583
T:
mcnie3q1282
201679020274722036181
T:
mcnie3q1921
220599722185052269876
T:
lotus256
226669922889462309723
T:
mcnie4q2562
253198625427842562546
T:
mcnie3q2561
285855928661682872827
T:
mcnie3q1922
334053733563133369412
T:
ronald1536
338402633974413410313
T:
mcnie3q2562
396531439676714023764
T:
rsa2048
397377139773763980355
T:
cargocult2048
458313445938024601080
T:
lotus128
596241859820516005551
T:
ronald2048
627923062902826301937
T:
ledapkc1264
672388367448726748876
T:
ledapkc1364
788370478985577905422
T:
ledapkc12sl
808928180991118163878
T:
ledapkc1464
885248089440898952812
T:
ledapkc13sl
959905896056499780346
T:
ledapkc14sl
164527421650511716541502
T:
ronald3072
181859731821436218304293
T:
ledapkc3264
183662491836860618377136
T:
r5n11pke0d
195373741960707619728960
T:
ledapkc3364
212225952126034021367782
T:
ledapkc3464
229834932301438923135568
T:
ledapkc32sl
282516932836374228574059
T:
ledapkc33sl
302531273030422730452870
T:
ledapkc34sl
307634023081723930833441
T:
r5n13pke0smallct
352215533526848235325493
T:
ronald4096
354899113571323335881615
T:
ledapkc5264
359888613600027836012106
T:
r5n13pke0d
433642104340489343670494
T:
ledapkc5364
513622685160906952337752
T:
ledapkc52sl
525060045278485552998124
T:
ledapkc5464
570664865761440658079812
T:
ledapkc53sl
665815776658985266594482
T:
r5n15pke0d
679818116806156668581780
T:
ledapkc54sl
237725919238053052238429806
T:
pqrsa15