forked from cory/tildefriends
31 lines
1.3 KiB
Plaintext
31 lines
1.3 KiB
Plaintext
|
These numbers are for 32 iterations ("$2a$05"):
|
||
|
|
||
|
OpenBSD 3.0 bcrypt(*) crypt_blowfish 0.4.4
|
||
|
Pentium III, 840 MHz 99 c/s 121 c/s (+22%)
|
||
|
Alpha 21164PC, 533 MHz 55.5 c/s 76.9 c/s (+38%)
|
||
|
UltraSparc IIi, 400 MHz 49.9 c/s 52.5 c/s (+5%)
|
||
|
Pentium, 120 MHz 8.8 c/s 20.1 c/s (+128%)
|
||
|
PA-RISC 7100LC, 80 MHz 8.5 c/s 16.3 c/s (+92%)
|
||
|
|
||
|
(*) built with -fomit-frame-pointer -funroll-loops, which I don't
|
||
|
think happens for libcrypt.
|
||
|
|
||
|
Starting with version 1.1 released in June 2011, default builds of
|
||
|
crypt_blowfish invoke a quick self-test on every hash computation.
|
||
|
This has roughly a 4.8% performance impact at "$2a$05", but only a 0.6%
|
||
|
impact at a more typical setting of "$2a$08".
|
||
|
|
||
|
The large speedup for the original Pentium is due to the assembly
|
||
|
code and the weird optimizations this processor requires.
|
||
|
|
||
|
The numbers for password cracking are 2 to 10% higher than those for
|
||
|
crypt_blowfish as certain things may be done out of the loop and the
|
||
|
code doesn't need to be reentrant.
|
||
|
|
||
|
Recent versions of John the Ripper (1.6.25-dev and newer) achieve an
|
||
|
additional 15% speedup on the Pentium Pro family of processors (which
|
||
|
includes Pentium III) with a separate version of the assembly code and
|
||
|
run-time CPU detection.
|
||
|
|
||
|
$Owl: Owl/packages/glibc/crypt_blowfish/PERFORMANCE,v 1.6 2011/06/21 12:09:20 solar Exp $
|