A random password with 80 bits of entropy is probably out of reach of most brute-force attackers in 2024, except those that are very well funded (e.g. cybergangs, 3-letter agencies, nation states, etc).
An attacker with ~$2300 of ASIC hardware can do about 190 tera-hashes per second. So, the time it would take to iterate through 2^80 passwords, and hash each one would be:
(2^80) hashes 1 second
* -------------------- = 6362767471 seconds
190 * 10^12 hashes
That's over 200 years.
Of course, a well funded attacker could devote more resources to brute-forcing the password to reduce the amount of time it would take, but this would result in greater cost for the equipment.
But, regardless of this tradeoff of equipment cost versus time, the cost for the energy to run the equipment would probably be prohibitive for most attackers. Modern ASIC hardware like the unit linked above requires ~27.5 Joules of energy per tera-hash. Converting the Joules to kilo-watt hours, and assuming a cost of $0.12 USD per kilowatt hour - the cost for the energy to iterate through 2^80 passwords, and hash each one would be over one million dollars:
2^80 hashes 27.5 Joules 1 Kilowatt-hour $0.12 USD $1,108,182 USD
* -------------- * ---------------- * -------------- =
10 ^ 12 hashes 3600000 Joules Kilowatt-hour
So, it would have to be a very valuable password to justify an attacker making this much of an investment to crack it.
What about the second part of my question, though?
"Now what if it's stored with 10 rounds of SHA256? Does that make it 10 times more resistant?"
– user13525 Feb 25 '24 at 08:46