john-the-ripper.txt

john-the-ripper

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2407163-NE-JOHNTHERI39
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
john-the-ripper
July 16
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


john-the-ripper.txtOpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon Gold 6348 @ 2.60GHz (56 Cores)Supermicro X12DPi-N6 v1.01 (1.4b BIOS)Intel Device 0998512GB479GB MR9361-8i + 1919GB MR9361-8illvmpipe4 x Intel I350 + 2 x Mellanox MT27710CentOS 7.9.20093.10.0-1160.119.1.el7.x86_64 (x86_64)GNOME Shell 3.28.3X Server 1.20.42.1 Mesa 18.3.4 (LLVM 7.0 256 bits)GCC 10.5.0xfs1536x864ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelDesktopDisplay ServerOpenGLCompilerFile-SystemScreen ResolutionJohn-the-ripper.txt BenchmarksSystem Logs- Transparent Huge Pages: always- -disable-multilib -enable-checking=release -enable-languages=c,c++ - Scaling Governor: acpi-cpufreq conservative - CPU Microcode: 0xd0003b9 - SELinux

john-the-ripper.txtjohn-the-ripper: MD5john-the-ripper: HMAC-SHA512john-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper73123331620253335893731022559107OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5john-the-ripper1.6M3.2M4.8M6.4M8MSE +/- 881.92, N = 373123331. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lrt -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512john-the-ripper30M60M90M120M150MSE +/- 247013.05, N = 31620253331. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lrt -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptjohn-the-ripper13K26K39K52K65KSE +/- 121.20, N = 3589371. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lrt -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKjohn-the-ripper70K140K210K280K350KSE +/- 337.01, N = 33102251. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lrt -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfishjohn-the-ripper13K26K39K52K65KSE +/- 15.21, N = 3591071. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lrt -lz -ldl -lcrypt -lbz2