john-the-ripper-base

john-the-ripper-base

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2310249-NE-JOHNTHERI31
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper-base
October 25 2023
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-baseOpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2680 v2 @ 3.60GHz (20 Cores / 40 Threads)HP 158A (J61 v03.69 BIOS)Intel Xeon E7 v2/Xeon64GB2000GB TOSHIBA DT01ACA2 + 256GB SanDisk SD8TB8U2NVIDIA NVE4 4GBRealtek ALC262LS24A40xUIntel 82579LM + Intel 82574LDebian 115.10.0-21-amd64 (x86_64)X Server 1.20.11nouveau4.3 Mesa 20.3.51.0.2GCC 10.2.1 20210110ext41920x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDisplay ServerDisplay DriverOpenGLVulkanCompilerFile-SystemScreen ResolutionJohn-the-ripper-base BenchmarksSystem Logs- Transparent Huge Pages: always- FLAGS=":-fwrapv:-fignore-pure-const-attrs:-fno-strict-aliasing:-fstrict-enums:-fno-delete-null-pointer-checks:-fconstrain-shift-value:-fno-finite-loops:-fno-constrain-bool-value:-fno-use-default-alignment:-fdrop-inbounds-from-gep -mllvm -disable-oob-analysis:-mllvm -zero-uninit-loads:-mllvm -disable-object-based-analysis:-fcheck-div-rem-overflow:-fdrop-noalias-restrict-attr:-fdrop-align-attr:-fdrop-deref-attr:-Xclang -no-enable-noundef-analysis:-fdrop-ub-builtins:-all" LDFLAGS= - Scaling Governor: intel_cpufreq schedutil - CPU Microcode: 0x417- itlb_multihit: KVM: Mitigation of VMX unsupported + l1tf: Mitigation of PTE Inversion + mds: Vulnerable: Clear buffers attempted no microcode; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Unknown: No mitigations + retbleed: Not affected + spec_store_bypass: Vulnerable + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines STIBP: disabled RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-base2004006008001000SE +/- 2.85, N = 31102

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-base30060090012001500SE +/- 0.67, N = 31487

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-base2004006008001000SE +/- 0.58, N = 31104

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-base400K800K1200K1600K2000KSE +/- 1527.53, N = 32023000

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-base9K18K27K36K45KSE +/- 6.43, N = 342250