VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Coffee Lake (806ea); 2018 Intel Core i3-8109U; 2 x 3000MHz; like, supercop-20250415

[Page version: 20250506 12:42:46]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
528293531753534746
T:
C:ntruees401ep2
609820612190615169
T:
C:ntruees439ep1
103734410418031046094
T:
C:ntruees593ep1
153296615392271543179
T:
C:ntruees743ep1
102857541046087410662421
T:
lotus128
184876581859045819016462
T:
lotus192
207602182086056320942719
T:
C:ntruees787ep1
274701112753124927586918
T:
mcnie4q1281
292558793003513331365740
T:
C:mceliece
312780883149586131845704
T:
lotus256
347276213505445535758958
T:
mcnie3q1281
33935803?46218965?76120959?
T:
ronald1024
459682174690772947052494
T:
mcnie4q1282
513657725174863452344901
T:
mcnie3q1282
614764766161196561720797
T:
mcnie4q1921
658834436625741466806009
T:
mcnie3q1921
781321017909871079235986
T:
mcnie4q2561
800667788016674180310254
T:
mcnie4q1922
892181968962379390081373
T:
mcnie3q1922
58656110?91946611?152341607?
T:
rsa2048
938041439411071194533885
T:
mcnie3q2561
105937246106054676106197333
T:
mcnie4q2562
59142976?107179869?161092828?
T:
cargocult2048
150416599150940730151876173
T:
mcnie3q2562
200119263?279226351?393990579?
T:
ronald1536
265318792?371102003?579759578?
T:
ronald2048
1096658064?1543175221?2058773390?
T:
ronald3072
2323899999?3660569112?5442118733?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
222372250423391
T:
rsa2048
218712281923781
T:
cargocult2048
357383626636617
T:
ronald1024
418474215842461
T:
C:ntruees401ep2
455474586446781
T:
ronald1536
460934681847391
T:
C:mceliece
473984768447964
T:
C:ntruees439ep1
605036137762836
T:
ronald2048
683906871169222
T:
C:ntruees593ep1
880808836788796
T:
C:ntruees743ep1
942119515995914
T:
ronald3072
106913107348107860
T:
C:ntruees787ep1
142992144337146240
T:
ronald4096
146404147685160278
T:
lotus128
214282214887215861
T:
lotus192
278695279311280401
T:
mcnie4q1281
300804303578304574
T:
lotus256
374270374709375395
T:
mcnie4q1282
462977464002468488
T:
mcnie4q1921
563823565514568685
T:
mcnie4q2561
593177594533595282
T:
mcnie3q1281
595392597283601105
T:
mcnie4q1922
653176654689656578
T:
mcnie4q2562
712854715478733719
T:
mcnie3q1282
904545907117912618
T:
mcnie3q1921
109689911005011101787
T:
mcnie3q1922
121354912190381221190
T:
mcnie3q2561
154113515537821557912
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
453074552645759
T:
C:ntruees401ep2
510085119251475
T:
C:ntruees439ep1
750347528375714
T:
C:ntruees593ep1
101579101904102644
T:
C:ntruees743ep1
140779141880144204
T:
C:ntruees787ep1
171321181495184567
T:
lotus128
252676252967253319
T:
lotus192
366085367122367703
T:
lotus256
816647854692862407
T:
C:mceliece
888380891113894682
T:
mcnie4q1281
910567918950926045
T:
ronald1024
119753012039931208168
T:
mcnie3q1281
120222212064941211116
T:
mcnie4q1282
145964214637711468345
T:
mcnie4q1921
149331914992641505991
T:
mcnie3q1282
171418617191951724833
T:
mcnie4q2561
173702717420801745862
T:
mcnie4q1922
177405517811211789088
T:
mcnie3q1921
201208820207112028463
T:
mcnie4q2562
208934620953452216055
T:
cargocult2048
208838920977972105117
T:
rsa2048
210546921119162119971
T:
mcnie3q1922
224778022534572260255
T:
mcnie3q2561
235546123726992384062
T:
ronald1536
291645229201992925510
T:
mcnie3q2562
348350434974733516682
T:
ronald2048
872554187566378781461
T:
ronald3072
178153331787998618503822
T:
ronald4096