John The Ripper2

2 x Intel Xeon Gold 6348 testing with a Supermicro X12DPi-N6 v1.01 (1.4b BIOS) and ASPEED on CentOS 7.9.2009 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2407165-NE-JOHNTHERI63
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
View Logs
Performance Per
Dollar
Date
Run
  Test
  Duration
John The Ripper2
July 16
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


John The Ripper2OpenBenchmarking.orgPhoronix Test Suite2 x Intel Xeon Gold 6348 @ 2.60GHz (56 Cores)Supermicro X12DPi-N6 v1.01 (1.4b BIOS)Intel Device 099816 x 32 GB DDR4-3200MT/s Samsung M393A4K40DB3-CWE479GB MR9361-8i + 1919GB MR9361-8iASPEED4 x Intel I350 + 2 x Mellanox MT27710CentOS 7.9.20093.10.0-1160.119.1.el7.x86_64 (x86_64)GNOME Shell 3.28.3X Server 1.20.4GCC 10.5.0xfs1024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelDesktopDisplay ServerCompilerFile-SystemScreen ResolutionJohn The Ripper2 BenchmarksSystem Logs- Transparent Huge Pages: always- -disable-multilib -enable-checking=release -enable-languages=c,c++ - Scaling Governor: acpi-cpufreq conservative - CPU Microcode: 0xd0003b9 - SELinux + gather_data_sampling: Mitigation of Microcode + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Mitigation of Clear buffers; SMT disabled + retbleed: Not affected + spec_store_bypass: Mitigation of SSB disabled via prctl and seccomp + spectre_v1: Mitigation of Load fences usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced IBRS IBPB + srbds: Not affected + tsx_async_abort: Not affected

John The Ripper2john-the-ripper: MD5john-the-ripper: HMAC-SHA512john-the-ripper: Blowfishjohn-the-ripper: WPA PSKjohn-the-ripper: bcryptJohn The Ripper272023331586186675882730843458752OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD5John The Ripper21.5M3M4.5M6M7.5MSE +/- 65757.97, N = 372023331. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lrt -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA512John The Ripper230M60M90M120M150MSE +/- 2187667.73, N = 31586186671. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lrt -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: BlowfishJohn The Ripper213K26K39K52K65KSE +/- 69.69, N = 3588271. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lrt -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSKJohn The Ripper270K140K210K280K350KSE +/- 74.00, N = 33084341. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lrt -lz -ldl -lcrypt -lbz2

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcryptJohn The Ripper213K26K39K52K65KSE +/- 28.00, N = 3587521. (CC) gcc options: -m64 -lssl -lcrypto -fopenmp -pthread -lm -lrt -lz -ldl -lcrypt -lbz2