john-the-ripper-1.8.0-base

john-the-ripper-1.8.0-base

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2311082-NE-JOHNTHERI04
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper-1.8.0-base
November 08 2023
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-1.8.0-baseOpenBenchmarking.orgPhoronix Test SuiteIntel Core i5-10500 @ 4.50GHz (6 Cores / 12 Threads)Dell 0NDYHG (1.5.2 BIOS)Intel Tiger Lake-H8GB1000GB MB001000GWFGF + 0GB SD Card ReaderIntel CometLake-S GT2 [UHD 630] (1150MHz)Realtek ALC3246LS24A40xUIntelDebian 126.1.0-13-amd64 (x86_64)GNOME Shell 43.6X ServerGCC 12.2.0ext41920x1080ProcessorMotherboardChipsetMemoryDiskGraphicsAudioMonitorNetworkOSKernelDesktopDisplay ServerCompilerFile-SystemScreen ResolutionJohn-the-ripper-1.8.0-base BenchmarksSystem Logs- Transparent Huge Pages: always- FLAGS= LDFLAGS=- Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xf8 - gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT vulnerable + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Mitigation of Microcode + tsx_async_abort: Not affected

john-the-ripper-1.8.0-basejohn-the-ripper: MD5john-the-ripper: HMAC-SHA512john-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper-1.8.0-base966296033333167732321677OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-1.8.0-base20K40K60K80K100KSE +/- 43.71, N = 396629

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-1.8.0-base1.3M2.6M3.9M5.2M6.5MSE +/- 666.67, N = 36033333

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-1.8.0-base400800120016002000SE +/- 0.00, N = 31677

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-1.8.0-base7001400210028003500SE +/- 0.67, N = 33232

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-1.8.0-base400800120016002000SE +/- 0.00, N = 31677