john-the-ripper-O2

john-the-ripper-O2

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2310253-NE-JOHNTHERI96
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper-O2
October 25 2023
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-O2OpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon E5-2680 v3 @ 3.30GHz (24 Cores / 48 Threads)Dell 0CN7X8 (2.7.1 BIOS)Intel Xeon E7 v3/Xeon32GB480GB INTEL SSDSC2BB480G7RMatrox G200eR2SMS27A350H4 x Broadcom NetXtreme BCM5720 PCIeUbuntu 22.045.15.0-82-generic (x86_64)GNOME Shell 42.9X Server 1.18.41.3.238Clang 18.0.0 + GCC 11.4.0nfs1600x1200ProcessorMotherboardChipsetMemoryDiskGraphicsMonitorNetworkOSKernelDesktopDisplay ServerVulkanCompilerFile-SystemScreen ResolutionJohn-the-ripper-O2 BenchmarksSystem Logs- Transparent Huge Pages: madvise- LDFLAGS=- Scaling Governor: intel_cpufreq ondemand - CPU Microcode: 0x49- gather_data_sampling: Not affected + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Mitigation of PTE Inversion; VMX: conditional cache flushes SMT vulnerable + mds: Mitigation of Clear buffers; SMT vulnerable + meltdown: Mitigation of PTI + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Retpolines IBPB: conditional IBRS_FW STIBP: conditional RSB filling PBRSB-eIBRS: Not affected + srbds: Not affected + tsx_async_abort: Not affected

john-the-ripper-O2john-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD5john-the-ripper-O29822430985336800059916OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-O22004006008001000SE +/- 0.33, N = 39821. (CC) clang options: -O2 -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-O25001000150020002500SE +/- 1.73, N = 324301. (CC) clang options: -O2 -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-O22004006008001000SE +/- 0.33, N = 39851. (CC) clang options: -O2 -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-O2700K1400K2100K2800K3500KSE +/- 577.35, N = 333680001. (CC) clang options: -O2 -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-O213K26K39K52K65KSE +/- 11.35, N = 3599161. (CC) clang options: -O2 -m64 -lssl -lcrypto -lgmp -lm -lrt -lz -ldl -lcrypt -lbz2