Calculate how long a hacker would need to crack your password using different attack methods, hash algorithms, and hardware configurations. Understand real-world password security.
Your password never leaves your browser. All calculations are performed locally.
You might also find these calculators useful
Calculate password strength using information entropy
Analyze password security and crack time
Generate MD5, SHA-1, SHA-256, SHA-384, and SHA-512 hashes from text
Convert between binary, decimal, hex & octal
Understanding password crack time is essential for cybersecurity. This calculator estimates how long different attackers with various hardware and hash algorithms would need to brute-force your password. From standard PCs to nation-state supercomputers, see the real-world implications of your password choices.
See how your password holds up against actual attack scenarios and hardware capabilities.
Learn why bcrypt and Argon2 are safer than MD5 or SHA-1 for storing passwords.
Evaluate security against different threat actors from hobbyists to nation-states.
Choose password length and complexity based on quantified crack resistance.
Time to crack is the estimated duration for an attacker to guess your password through brute-force attack. We calculate the average time (50% of all combinations) based on the character pool size, password length, hash speed, and hardware power.
Different hash algorithms have vastly different speeds. MD5 can be computed billions of times per second, while bcrypt and Argon2 are intentionally slow (thousands per second), making brute-force attacks much harder regardless of hardware.
Online attacks are limited by server rate-limiting (typically 1000 attempts/second max). Offline attacks occur when hackers steal password databases and can try billions of combinations per second without restrictions.
These are theoretical maximums assuming pure brute-force. Real attacks often use dictionaries, rainbow tables, and pattern analysis which can be faster for common passwords. However, for random passwords, these estimates are representative.
Against brute-force, yes. But passwords can be compromised through phishing, data breaches, keyloggers, or social engineering. Always use unique passwords, enable 2FA, and check haveibeenpwned.com for compromised credentials.