VAMPIRE

eBACS: ECRYPT Benchmarking of Cryptographic Systems


ECRYPT II
General information:IntroductioneBASHeBASCeBAEADeBATSSUPERCOPXBXComputersArch
How to submit new software:Tipshashstreamaeaddhkemencryptsign
List of primitives measured:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
Measurements:lwcsha3hashstreamlwccaesaraeaddhkemencryptsign
List of subroutines:verifydecodeencodesortcorehashblocksxofscalarmult

Measurements of public-key cryptosystems on one machine: amd64; Haswell+AES (306c3); 2013 Intel Core i7-4770; 4 x 3400MHz; speed2supercop, supercop-20250922

[Page version: 20251005 01:31:26]

eBATS (ECRYPT Benchmarking of Asymmetric Systems) is a project to measure the performance of public-key systems. This page presents benchmark results collected in eBATS for public-key encryption:

Each table row lists the first quartile of many speed measurements, the median of many speed measurements, the third quartile of many speed measurements, and the name of the primitive. Measurements with large variance are indicated in red with question marks. The symbol C: means that the current SUPERCOP database does not list IND-CCA2 security as a goal for this public-key cryptosystem. The symbol T: (starting with supercop-20200816) means that the SUPERCOP database at the time of benchmarking did not list constant time as a goal for this implementation. The symbol T!!! means that constant time was listed as a goal for this implementation, but that the implementation failed TIMECOP. (TIMECOP failures are not necessarily security issues; they can sometimes be resolved by, e.g., declaring that a rejection-sampling condition is safe to declassify.)

There is a separate page with more information about each public-key cryptosystem and each implementation. Designers and implementors interested in submitting new public-key cryptosystems and new implementations of existing cryptosystems should read the call for submissions.


Test results

Graphs: (pkcycles,pkbytes) (ccycles,pkbytes) (ccycles,cbytes) (mcycles,cbytes) (pkbytes,cbytes)

Cycles to generate a key pair
25%50%75%system
447508450384454048
T:
C:ntruees401ep2
518548521596525816
T:
C:ntruees439ep1
877972882656888900
T:
C:ntruees593ep1
126097212664041272520
T:
C:ntruees743ep1
114566201201474412037164
T:
lotus128
220479362240425622570912
T:
lotus192
291037443015567232967532
T:
C:mceliece
304900523060774030673004
T:
C:ntruees787ep1
331226363328478033783816
T:
mcnie4q1281
385738444010054841179424
T:
lotus256
434197844371209644130812
T:
mcnie3q1281
560686165624031656623008
T:
mcnie4q1282
615897166215767662865016
T:
mcnie3q1282
43366548?72609424?108869340?
T:
ronald1024
767728527721594877654492
T:
mcnie4q1921
868383488738354487907448
T:
mcnie3q1921
996940489978211299899760
T:
mcnie4q2561
102552140103159452104153500
T:
mcnie4q1922
61369380?110676316?164461376?
T:
rsa2048
117943256118737836119276880
T:
mcnie3q1922
67577652?123558092?180847352?
T:
cargocult2048
123273776123614020124102212
T:
mcnie3q2561
137353324137467084137644308
T:
mcnie4q2562
204586752205711728206796076
T:
mcnie3q2562
215286068?315249992?443381116?
T:
ronald1536
294321092?442225156?536878932?
T:
ronald2048
1499268780?2164994172?3724902136?
T:
ronald3072
3602810524?6259672692?8352130084?
T:
ronald4096
Cycles to encrypt 59 bytes
25%50%75%system
248762532826136
T:
rsa2048
252362613227380
T:
cargocult2048
411324134441648
T:
C:ntruees401ep2
433564365648056
T:
ronald1024
464684680846984
T:
C:ntruees439ep1
476844844449208
T:
C:mceliece
563605724461068
T:
ronald1536
662926663266900
T:
C:ntruees593ep1
740887669678900
T:
ronald2048
844328474085160
T:
C:ntruees743ep1
111232112428113056
T:
C:ntruees787ep1
121996125408131432
T:
ronald3072
153144153496175268
T:
lotus128
189744193148198876
T:
ronald4096
231928232336232804
T:
lotus192
330116331792336776
T:
mcnie4q1281
332732333168333652
T:
lotus256
441216444660445944
T:
mcnie4q1282
552008553096554684
T:
mcnie4q1921
649984651312661488
T:
mcnie4q1922
680732683072684308
T:
mcnie4q2561
695472698884701604
T:
mcnie3q1281
794736796536798708
T:
mcnie4q2562
862744869740873148
T:
mcnie3q1282
106414010656881069184
T:
mcnie3q1921
128194412834841285368
T:
mcnie3q1922
144179614441241448468
T:
mcnie3q2561
187456018775121880300
T:
mcnie3q2562
Cycles to decrypt 59 bytes
25%50%75%system
462764642847232
T:
C:ntruees401ep2
523325279653404
T:
C:ntruees439ep1
758367622077264
T:
C:ntruees593ep1
101200101784103492
T:
C:ntruees743ep1
161152168348169480
T:
C:ntruees787ep1
177416195380214460
T:
lotus128
274468275652276236
T:
lotus192
404084404564404916
T:
lotus256
99934810050441014928
T:
mcnie4q1281
103246810368521039092
T:
C:mceliece
112911611361841148708
T:
ronald1024
133906013454601362748
T:
mcnie3q1281
136930013782481396040
T:
mcnie4q1282
163758016483001663828
T:
mcnie4q1921
166935216837401696616
T:
mcnie3q1282
194890819623841976576
T:
mcnie4q1922
197216419844401995504
T:
mcnie4q2561
205190420657642081868
T:
mcnie3q1921
233943223520482365268
T:
mcnie4q2562
246400024804362491216
T:
mcnie3q1922
261723226365722655360
T:
mcnie3q2561
263258026399162792984
T:
cargocult2048
264932026829202805896
T:
rsa2048
293165229542922991868
T:
ronald1536
347792434880403504124
T:
mcnie3q2562
376877237921083820928
T:
ronald2048
129674201301085213105748
T:
ronald3072
272778162734173227570340
T:
ronald4096