2 x Intel Xeon E5620 testing with a Supermicro X8DTU (2.1b BIOS) and Matrox MGA G200eW WPCM450 on CentOS 6.10 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 1907309-HV-BLAKE2TES55
Jump To Table - Results


Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs


Show Detailed System Result Table

blake2-testOpenBenchmarking.orgPhoronix Test Suite 10.2.22 x Intel Xeon E5620 @ 2.40GHz (8 Cores / 16 Threads)Supermicro X8DTU (2.1b BIOS)Intel 5520 I/O + ICH10R12 x 8192 MB 800MHz Kingston299GB MR-USAS2Matrox MGA G200eW WPCM4504 x Intel 82576 + 2 x Intel 82599ES 10-Gigabit SFI/SFP+ + 16 x Intel 82599 Virtual FunctionCentOS (x86_64)GCC 4.4.7 20120313ext4ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemBlake2-test BenchmarksSystem Logs- --build=x86_64-redhat-linux --disable-dssi --disable-libjava-multilib --disable-libunwind-exceptions --enable-__cxa_atexit --enable-bootstrap --enable-checking=release --enable-gnu-unique-object --enable-java-awt=gtk --enable-java-maintainer-mode --enable-languages=c,c++,objc,obj-c++,java,fortran,ada --enable-libgcj-multifile --enable-shared --enable-threads=posix --mandir=/usr/share/man --with-arch_32=i686 --with-cloog --with-ppl --with-tune=generic - Scaling Governor: acpi-cpufreq performance- l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of Load fences + spectre_v2: Vulnerable: Retpoline with unsafe module(s) IBPB


This is a benchmark of BLAKE2 using the blake2s binary. BLAKE2 is a high-performance crypto alternative to MD5 and SHA-2/3. Learn more via the test page.

OpenBenchmarking.orgCycles Per Byte, Fewer Is BetterBLAKE2 20170307default1.34332.68664.02995.37326.7165SE +/- 0.00, N = 35.971. (CC) gcc options: -O3 -march=native -lcrypto -lz