VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Coffee Lake (806ea); 2018 Intel Core i3-8109U; 2 x 3000MHz; like, supercop-20250922

[Page version: 20251005 01:31:26]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
527748530825533552
T:
C:ntruees401ep2
612196615036617990
T:
C:ntruees439ep1
103921010448081048491
T:
C:ntruees593ep1
153690415415541545528
T:
C:ntruees743ep1
945610295089479575229
T:
lotus128
185083661861022419292855
T:
lotus192
208030992087667820960557
T:
C:ntruees787ep1
274701112753124927586918
T:
mcnie4q1281
291670692993632632190115
T:
C:mceliece
311463873122304432029490
T:
lotus256
347276213505445535758958
T:
mcnie3q1281
459682174690772947052494
T:
mcnie4q1282
34456025?51575775?66997667?
T:
ronald1024
513657725174863452344901
T:
mcnie3q1282
614764766161196561720797
T:
mcnie4q1921
658834436625741466806009
T:
mcnie3q1921
781321017909871079235986
T:
mcnie4q2561
800667788016674180310254
T:
mcnie4q1922
892181968962379390081373
T:
mcnie3q1922
938041439411071194533885
T:
mcnie3q2561
57609605?98575423?157673354?
T:
rsa2048
65498509?104651590?185009475?
T:
cargocult2048
105937246106054676106197333
T:
mcnie4q2562
150416599150940730151876173
T:
mcnie3q2562
180857379?266850526?348829092?
T:
ronald1536
305363359?456283362?714146163?
T:
ronald2048
1028328950?1666428896?2507095856?
T:
ronald3072
2693335690?4100289706?5606095412?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
220432264323958
T:
cargocult2048
227022329824178
T:
rsa2048
365773695737804
T:
ronald1024
418694211842305
T:
C:ntruees401ep2
463724688747251
T:
C:mceliece
464244737347958
T:
ronald1536
475554793848449
T:
C:ntruees439ep1
589036001360921
T:
ronald2048
684296874469111
T:
C:ntruees593ep1
881988838388744
T:
C:ntruees743ep1
958809691098112
T:
ronald3072
106865107304107735
T:
C:ntruees787ep1
144007145247147119
T:
ronald4096
148000148595149687
T:
lotus128
214211214735215138
T:
lotus192
278695279311280401
T:
mcnie4q1281
299995301468304814
T:
lotus256
374270374709375395
T:
mcnie4q1282
462977464002468488
T:
mcnie4q1921
563823565514568685
T:
mcnie4q2561
593177594533595282
T:
mcnie3q1281
595392597283601105
T:
mcnie4q1922
653176654689656578
T:
mcnie4q2562
712854715478733719
T:
mcnie3q1282
904545907117912618
T:
mcnie3q1921
109689911005011101787
T:
mcnie3q1922
121354912190381221190
T:
mcnie3q2561
154113515537821557912
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
451824539645707
T:
C:ntruees401ep2
510365146852004
T:
C:ntruees439ep1
752497550275778
T:
C:ntruees593ep1
101898102472103122
T:
C:ntruees743ep1
141252141686143315
T:
C:ntruees787ep1
171216172440173000
T:
lotus128
251554254346254995
T:
lotus192
364606365569368235
T:
lotus256
744411856418860934
T:
C:mceliece
888380891113894682
T:
mcnie4q1281
908169919095924980
T:
ronald1024
119753012039931208168
T:
mcnie3q1281
120222212064941211116
T:
mcnie4q1282
145964214637711468345
T:
mcnie4q1921
149331914992641505991
T:
mcnie3q1282
171418617191951724833
T:
mcnie4q2561
173702717420801745862
T:
mcnie4q1922
177405517811211789088
T:
mcnie3q1921
201208820207112028463
T:
mcnie4q2562
209377420949022107620
T:
cargocult2048
209683920983202106433
T:
rsa2048
210546921119162119971
T:
mcnie3q1922
224778022534572260255
T:
mcnie3q2561
235251223622452374338
T:
ronald1536
291645229201992925510
T:
mcnie3q2562
348266735061543552353
T:
ronald2048
872784787609868965982
T:
ronald3072
177758201781961717868998
T:
ronald4096