john-the-ripper-base

john-the-ripper-base

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2310246-NE-JOHNTHERI64
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper-base
October 24 2023
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-baseOpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2680 v3 @ 3.30GHz (24 Cores / 48 Threads)Dell 0CN7X8 (2.7.1 BIOS)Intel Xeon E7 v3/Xeon32GB480GB INTEL SSDSC2BB480G7RMatrox G200eR2SMS27A350H4 x Broadcom NetXtreme BCM5720 PCIeUbuntu 22.045.15.0-82-generic (x86_64)GNOME Shell 42.9X Server 1.18.41.3.238Clang 18.0.0 + GCC 11.4.0nfs1600x1200ProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkOSKernelDesktopDisplay ServerVulkanCompilerFile-SystemScreen ResolutionJohn-the-ripper-base BenchmarksSystem Logs- Transparent Huge Pages: madvise- LDFLAGS=- Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x49- gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected

john-the-ripper-basejohn-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD5john-the-ripper-base9842419984336433359840OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-base2004006008001000SE +/- 0.33, N = 39841. (CC) clang options: -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2 -mavx2 -O3 -march=native -Qunused-arguments -std=gnu89 -funroll-loops

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-base5001000150020002500SE +/- 15.00, N = 324191. (CC) clang options: -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2 -mavx2 -O3 -march=native -Qunused-arguments -std=gnu89 -funroll-loops

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-base2004006008001000SE +/- 0.00, N = 39841. (CC) clang options: -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2 -mavx2 -O3 -march=native -Qunused-arguments -std=gnu89 -funroll-loops

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-base700K1400K2100K2800K3500KSE +/- 333.33, N = 333643331. (CC) clang options: -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2 -mavx2 -O3 -march=native -Qunused-arguments -std=gnu89 -funroll-loops

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-base13K26K39K52K65KSE +/- 9.60, N = 3598401. (CC) clang options: -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2 -mavx2 -O3 -march=native -Qunused-arguments -std=gnu89 -funroll-loops