john-the-ripper-1.8.0-all

john-the-ripper-1.8.0-all

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2403189-NE-JOHNTHERI35
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper-1.8.0-all
March 18
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper-1.8.0-allOpenBenchmarking.orgPhoronix Test SuiteIntel Core i5-10500 @ 3.10GHz (6 Cores)Dell 0NDYHG (1.25.0 BIOS)Intel Tiger Lake-H8GBPC SN730 NVMe WDC 256GB + 1000GB MB001000GWFGF + 0GB SD Card ReaderIntel CometLake-S GT2 [UHD 630] (1150MHz)Realtek ALC3246IntelDebian 126.1.0-13-amd64 (x86_64)X Server 1.21.1.7GCC 12.2.0ext4ProcessorMotherboardChipsetMemoryDiskGraphicsAudioNetworkOSKernelDisplay ServerCompilerFile-SystemJohn-the-ripper-1.8.0-all BenchmarksSystem Logs- Transparent Huge Pages: always- LDFLAGS=-latomic- Scaling Governor: intel_pstate performance (EPP: performance) - CPU Microcode: 0xf8- gather_data_sampling: Mitigation of Microcode + itlb_multihit: KVM: Mitigation of VMX disabled + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT disabled + retbleed: Mitigation of Enhanced IBRS + spec_rstack_overflow: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB: conditional RSB filling PBRSB-eIBRS: SW sequence + srbds: Mitigation of Microcode + tsx_async_abort: Not affected

john-the-ripper-1.8.0-alljohn-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD5john-the-ripper-1.8.0-all114717411148414833354673OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper-1.8.0-all2004006008001000SE +/- 0.58, N = 31147

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper-1.8.0-all400800120016002000SE +/- 0.33, N = 31741

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper-1.8.0-all2004006008001000SE +/- 0.33, N = 31148

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper-1.8.0-all900K1800K2700K3600K4500KSE +/- 666.67, N = 34148333

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper-1.8.0-all12K24K36K48K60KSE +/- 8.74, N = 354673