Blog
Custom Print on Demand Apparel — Free Storefront for Your Business
Wild & Free Tools

Password Crack Times Explained — From Instant to Heat Death of the Universe

Last updated: April 202610 min readGenerator Tools

Password cracking is math, not magic. Every password has a calculable number of possible combinations. Every cracking rig has a measurable speed. Divide one by the other and you get a crack time — from fractions of a second to longer than the heat death of the universe. Here are the real numbers.

Character Set Sizes

The "character set" is the pool of possible characters for each position in your password. Larger pool = more combinations = harder to crack:

Character SetCharacters IncludedPool SizeExample
Digits only0-910482917
Lowercase onlya-z26mxkfpq
Lowercase + uppercasea-z, A-Z52mXkFpQ
Alphanumerica-z, A-Z, 0-962mX4FpQ
Full printable ASCIIa-z, A-Z, 0-9, symbols95mX4!pQ@#
Extended (Unicode)All above + accented, CJK, etc.~143,000+mX4!pñQü

Most password crackers assume the full printable ASCII set (95 characters) as a worst case. If they know you only used lowercase, they narrow to 26 — and your password becomes roughly 95/26 = 3.65x easier to crack per character position.

The Combinations Formula

Total possible passwords = character_set_size ^ length

This is an exponential relationship. Each additional character does not add — it multiplies. That is why length is so powerful:

LengthLowercase (26)Alphanumeric (62)Full ASCII (95)Entropy (Full ASCII)
6309 million56 billion735 billion39.4 bits
8208 billion218 trillion6.6 quadrillion52.6 bits
10141 trillion839 quadrillion59.9 quintillion65.7 bits
1295.4 quadrillion3.2 quintillion540 sextillion78.8 bits
1464.5 quintillion12.4 sextillion4.9 x 10^2791.9 bits
1643.6 sextillion47.7 septillion4.4 x 10^31105.1 bits
1829.5 septillion183 octillion4.2 x 10^35118.2 bits
2019.9 octillion704 nonillion3.6 x 10^39131.4 bits

Reading this table: a 12-character password using full ASCII has 540 sextillion possible combinations (540 followed by 21 zeros). That is 540,000,000,000,000,000,000,000 guesses an attacker must try to be certain they find it.

Attack Speeds in 2026

How fast an attacker can try passwords depends on two things: their hardware, and the hash algorithm used by the system storing the password.

Attack ScenarioSpeed (hashes/sec)HardwareNotes
Online attack (rate-limited)~100-1,000/secAnyMost websites lock accounts after 5-10 failed attempts
Offline — MD5 hash~50 billion/secSingle RTX 4090MD5 is broken for passwords. Sites still using it are negligent.
Offline — SHA-1 hash~20 billion/secSingle RTX 4090Slightly better than MD5. Still inadequate.
Offline — SHA-256 hash~10 billion/secSingle RTX 4090Better but still a fast hash. Not designed for passwords.
Offline — bcrypt (cost 10)~1,500/secSingle RTX 4090Purpose-built for passwords. Intentionally slow.
Offline — bcrypt (cost 12)~100/secSingle RTX 4090Recommended minimum cost factor.
Offline — Argon2id~10-50/secSingle RTX 4090State of the art. Memory-hard — resists GPU parallelism.
GPU cluster~100 billion/sec (MD5)8x A100 clusterNation-state or organized crime level
Future (2030 estimate)~1 trillion/sec (MD5)Next-gen hardwarePlanning margin. Today's "centuries" might become "decades."

The critical insight: your password's crack time depends on which hash the site uses. A 12-character random password against bcrypt would take millions of years. The same password against unsalted MD5 takes weeks. You cannot control which hash a website uses — so make your password strong enough to survive even fast hashes.

Crack Time Table: SHA-256 at 10 Billion/sec

This table uses SHA-256 at 10 billion guesses per second — a realistic single-GPU scenario for a motivated attacker with an offline database dump:

Password LengthLowercase Only (26)Alphanumeric (62)Full ASCII (95)
6< 1 second5.6 seconds1.2 minutes
821 seconds6 hours7.6 days
104 hours2.7 years190 years
12302 days10,000 years1.7 million years
14558 years39 million years15.5 billion years
16400,000 years151 billion years14 trillion years
18280 million years580 trillion years13 quadrillion years
20194 billion years2.2 quadrillion years11.5 quintillion years

For context: the universe is about 13.8 billion years old. The heat death of the universe is estimated at ~10^100 years. A random 16-character full-ASCII password sits comfortably in "outlasts the solar system" territory even against fast hashes.

Why Common Passwords Are Instant Regardless of Length

The crack times above assume random passwords — every character independently chosen with equal probability. Real passwords are not random. Attackers exploit this ruthlessly:

This is why "December2026!" is cracked in minutes despite being 13 characters with mixed types. The effective entropy is far lower than the theoretical maximum because the pattern is predictable.

Length vs Complexity: The Final Answer

Every additional character of length multiplies total combinations by the character set size. Adding a character type (going from lowercase to mixed case) multiplies by a smaller factor spread across existing characters. The math always favors length:

OptionChangeEntropy AddedEffort
Add 1 character (full ASCII)16 chars → 17 chars+6.6 bits1 more character to type
Add symbols to lowercase-only26 → 95 char set+1.87 bits per positionShift key + memorization
Add 4 characters (lowercase)12 chars → 16 chars+18.8 bits4 more characters to type
Add uppercase + digits + symbols26 → 95 char set+1.87 bits × 12 = +22.4 bitsSignificant memorization burden

For a 12-character password: adding 4 more lowercase characters (easy to type) gives you +18.8 bits. Switching to full ASCII (harder to type and remember) gives you +22.4 bits. The complexity route wins by a slim margin — but requires dramatically more effort. And a 16-character lowercase password (75.2 bits) is already virtually uncrackable.

Test Your Own Password

All these numbers mean nothing until you check your actual password against them. Open the Password Strength Checker, type your password, and see where it falls on this scale. If it is under 60 bits of entropy, the Password Generator can create a replacement in one click.

Related Security Tools

See where your password falls — seconds, centuries, or heat death of the universe.

Check Your Password
Launch Your Own Clothing Brand — No Inventory, No Risk