VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Tremont (906c0); 2021 Intel Celeron N5105; 4 x 2000MHz; jasper3, supercop-20241022

[Page version: 20241120 00:41:14]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
871468767588426
T:
r5nd1pke5d
120293121090122434
T:
r5nd1pke0d
174727176424177611
T:
r5nd3pke0d
180389181847183032
T:
r5nd3pke5d
215624216826218248
T:
r5nd5pke0d
310234311729313547
T:
r5nd5pke5d
231399602314703923149074
T:
r5n11pke0d
321123283319762534623846
T:
C:mceliece
400139934035181040600214
T:
lotus192
446095924461414644621083
T:
r5n13pke0d
455206164562956345718280
T:
mcnie4q1281
607785066102989361550781
T:
mcnie3q1281
613810706187231262348090
T:
ledapkc1464
632636616350017063703242
T:
mcnie4q1282
701494347039818170895819
T:
lotus256
758573737600910276141870
T:
ledapkc1364
788678817887351978878992
T:
r5n15pke0d
785639947897842680736771
T:
ledapkc13sl
45336526?85790964?137329150?
T:
ronald1024
852520408600143587493813
T:
ledapkc14sl
871093718741665588189959
T:
mcnie3q1282
101981777102084659102235934
T:
mcnie4q1921
102073789102571888103225648
T:
mcnie3q1921
109625997109954694110288863
T:
mcnie4q2561
112279755112662898113039691
T:
mcnie4q1922
151047142151518083151915398
T:
mcnie4q2562
154837692155214651155743330
T:
mcnie3q1922
154968615155580991156145910
T:
mcnie3q2561
181992235182360764182668390
T:
ledapkc1264
193808551194878397198276624
T:
ledapkc3464
136997931?202086790?340316117?
T:
rsa2048
141276504?203561674?348328360?
T:
cargocult2048
212486252212716512213377008
T:
ledapkc12sl
219563941220095757225107288
T:
ledapkc34sl
224554065224652883226443696
T:
ledapkc3264
228907067229262726229903992
T:
ledapkc3364
134042054?231965039?410479654?
T:
ronald1536
254963648255752776256485718
T:
mcnie3q2562
254802537256529916260096768
T:
ledapkc5464
260348592260845424263226414
T:
ledapkc33sl
274344026274373290274439197
T:
lotus128
520289838521162891522795421
T:
ledapkc5364
369627198?574905558?927939093?
T:
ronald2048
657624021658659053666148712
T:
ledapkc54sl
659454803661786735665657864
T:
ledapkc32sl
685879612688091056693552497
T:
ledapkc53sl
696556332698616640700419915
T:
ledapkc5264
741759454741787995741846544
T:
r5n13pke0smallct
150662293815108144411516985291
T:
ledapkc52sl
1267411615?1901465400?3295016134?
T:
ronald3072
2941628901?5110351886?7996898711?
T:
ronald4096
557419887557932812445937129240
T:
pqrsa15
Cycles to encrypt 59 bytes
25%50%75%system
296633016631637
T:
rsa2048
294483020531487
T:
cargocult2048
424524312044905
T:
ronald1024
435074384944301
T:
C:mceliece
587675937162389
T:
ronald1536
802958255084108
T:
ronald2048
142546143853146842
T:
ronald3072
143899144289145165
T:
r5nd1pke5d
194728195538196311
T:
r5nd1pke0d
222213224127226886
T:
ronald4096
273963275005276930
T:
r5nd3pke5d
290965294910296780
T:
r5nd3pke0d
365658369369370254
T:
r5nd5pke0d
408454409417410603
T:
mcnie4q1281
453192456854461413
T:
r5nd5pke5d
664766670325676294
T:
mcnie4q1282
683594684294685195
T:
mcnie4q1921
876140878266882336
T:
mcnie3q1281
957346969987989183
T:
mcnie4q1922
965441973345982457
T:
mcnie4q2561
109517610969591099368
T:
mcnie3q1282
111570611244471133161
T:
lotus192
114404311733741185569
T:
mcnie4q2562
158937016043611627964
T:
lotus256
162479816320101633997
T:
mcnie3q1922
162057916472211690971
T:
mcnie3q1921
215912421950622234058
T:
mcnie3q2561
286029029351382978140
T:
mcnie3q2562
350854935107993515351
T:
lotus128
757478475817607591179
T:
r5n13pke0smallct
780889678379047959594
T:
ledapkc13sl
841186884624258486196
T:
ledapkc1364
970282897187739734013
T:
ledapkc1264
104682641050123310510642
T:
ledapkc12sl
105915431059969010657927
T:
ledapkc1464
116164041165970311852965
T:
ledapkc3264
124999351251889412546908
T:
ledapkc14sl
178410571785054417855162
T:
r5n11pke0d
211908242121719121236825
T:
ledapkc3364
264361772647050927187600
T:
ledapkc33sl
283676582838041828391135
T:
ledapkc3464
306229833066021230706194
T:
ledapkc32sl
344514063445913134467489
T:
r5n13pke0d
355800053569131736625404
T:
ledapkc34sl
360239413612330937327285
T:
ledapkc5264
396907763978594140316307
T:
ledapkc5464
496015094964657349774267
T:
ledapkc5364
565546885665140056796969
T:
pqrsa15
648095166481358364819155
T:
r5n15pke0d
656206556592617566074095
T:
ledapkc53sl
694903256956524069720920
T:
ledapkc52sl
879199068909111294073235
T:
ledapkc54sl
Cycles to decrypt 59 bytes
25%50%75%system
203872205259206940
T:
r5nd1pke5d
290662291322293246
T:
r5nd1pke0d
408291410328412908
T:
r5nd3pke5d
434469437827440984
T:
r5nd3pke0d
550431552748554327
T:
r5nd5pke0d
692718694143704912
T:
r5nd5pke5d
706765719360776644
T:
C:mceliece
111833711233191129674
T:
mcnie4q1281
120116812099401221220
T:
ronald1024
133638613439051356191
T:
mcnie4q1282
148420015250161604219
T:
lotus192
155876115633111569225
T:
mcnie3q1281
186752518717161879267
T:
mcnie4q1921
188210918930191910502
T:
mcnie4q1922
191339119239561934592
T:
mcnie4q2561
195033019575301968843
T:
mcnie3q1282
199713320143252033316
T:
mcnie3q1921
222888322466342288020
T:
lotus256
226474822808062322400
T:
mcnie4q2562
253700225499542564457
T:
mcnie3q2561
282964128430222853417
T:
mcnie3q1922
334881133651613380294
T:
ronald1536
338906834006833416103
T:
mcnie3q2562
397657739778813978868
T:
rsa2048
396667639862043986523
T:
cargocult2048
458184045939494598648
T:
lotus128
596317259951766009414
T:
ronald2048
626549562899666300439
T:
ledapkc1264
673887467487536754581
T:
ledapkc1364
784752578671437880203
T:
ledapkc12sl
810707081124378118870
T:
ledapkc1464
888832989196748938670
T:
ledapkc13sl
965656996883499706274
T:
ledapkc14sl
165220961659240116670877
T:
ronald3072
182324361825351818358031
T:
ledapkc3264
183578631836897918373143
T:
r5n11pke0d
194733681950491119573588
T:
ledapkc3364
210677102109939421155722
T:
ledapkc3464
230107752303880123203067
T:
ledapkc32sl
280780002820025628275409
T:
ledapkc33sl
300511263009026830230033
T:
ledapkc34sl
307929413086352330878482
T:
r5n13pke0smallct
352560293532483135396861
T:
ronald4096
356180683573936135878192
T:
ledapkc5264
360779623608048336084194
T:
r5n13pke0d
433438204338213944464507
T:
ledapkc5364
509166015096706251554106
T:
ledapkc52sl
524732605296949753128203
T:
ledapkc5464
569410155732542457578454
T:
ledapkc53sl
665548606656558566568426
T:
r5n15pke0d
688816466923628671403261
T:
ledapkc54sl
236649857236725317236948763
T:
pqrsa15