benchmark-pts-john-the-ripper

2 x AMD EPYC 9174F 16-Core testing with a Dell PowerEdge R6625 05KY9C (1.8.3 BIOS) and Matrox G200eW3 on Rocky Linux 8.10 via the Phoronix Test Suite.

Compare your own system(s) to this result file with the Phoronix Test Suite by running the command: phoronix-test-suite benchmark 2409067-NE-BENCHMARK69
Jump To Table - Results

Statistics

Remove Outliers Before Calculating Averages

Graph Settings

Prefer Vertical Bar Graphs

Multi-Way Comparison

Condense Multi-Option Tests Into Single Result Graphs

Table

Show Detailed System Result Table

Run Management

Result
Identifier
Performance Per
Dollar
Date
Run
  Test
  Duration
2 x AMD EPYC 9174F 16-Core
September 06
  11 Minutes
Only show results matching title/arguments (delimit multiple options with a comma):
Do not show results matching title/arguments (delimit multiple options with a comma):


benchmark-pts-john-the-ripperOpenBenchmarking.orgPhoronix Test Suite2 x AMD EPYC 9174F 16-Core @ 4.41GHz (32 Cores / 64 Threads)Dell PowerEdge R6625 05KY9C (1.8.3 BIOS)AMD Device 14a44 x 64 GB DDR5-4800MT/s MTC40F2046S1RC48BA11600GB RAIDMatrox G200eW34 x Intel X710 for 10GBASE-T + 16 x Intel Virtual Function 700 + 2 x Broadcom NetXtreme BCM5720 PCIeRocky Linux 8.104.18.0-553.16.1.el8_10.x86_64 (x86_64)GCC 8.5.0 20210514xfs1024x768ProcessorMotherboardChipsetMemoryDiskGraphicsNetworkOSKernelCompilerFile-SystemScreen ResolutionBenchmark-pts-john-the-ripper PerformanceSystem Logs- Transparent Huge Pages: always- Scaling Governor: acpi-cpufreq performance (Boost: Enabled) - CPU Microcode: 0xa101148- SELinux + gather_data_sampling: Not affected + itlb_multihit: Not affected + l1tf: Not affected + mds: Not affected + meltdown: Not affected + mmio_stale_data: Not affected + reg_file_data_sampling: Not affected + retbleed: Not affected + spec_rstack_overflow: Mitigation of Safe RET + spec_store_bypass: Mitigation of SSB disabled via prctl + spectre_v1: Mitigation of usercopy/swapgs barriers and __user pointer sanitization + spectre_v2: Mitigation of Enhanced / Automatic IBRS; IBPB: conditional; STIBP: always-on; RSB filling; PBRSB-eIBRS: Not affected; BHI: Not affected + srbds: Not affected + tsx_async_abort: Not affected

benchmark-pts-john-the-ripperjohn-the-ripper: bcryptjohn-the-ripper: WPA PSKjohn-the-ripper: Blowfishjohn-the-ripper: HMAC-SHA512john-the-ripper: MD52 x AMD EPYC 9174F 16-Core173276384717321385913331685000OpenBenchmarking.org

John The Ripper

This is a benchmark of John The Ripper, which is a password cracker. Learn more via the OpenBenchmarking.org test page.

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: bcrypt2 x AMD EPYC 9174F 16-Core4K8K12K16K20KSE +/- 60.34, N = 317327

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: WPA PSK2 x AMD EPYC 9174F 16-Core14K28K42K56K70KSE +/- 222.38, N = 363847

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: Blowfish2 x AMD EPYC 9174F 16-Core4K8K12K16K20KSE +/- 81.13, N = 317321

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: HMAC-SHA5122 x AMD EPYC 9174F 16-Core8M16M24M32M40MSE +/- 123592.52, N = 338591333

OpenBenchmarking.orgReal C/S, More Is BetterJohn The Ripper 2023.03.14Test: MD52 x AMD EPYC 9174F 16-Core400K800K1200K1600K2000KSE +/- 4932.88, N = 31685000