| Algorithm | Key Space | Security | Brute-force Time | Use Today? |
| Caesar | 25 keys | None | < 1ms | Never |
| MD5 | 2^128 | Broken | Seconds (GPU) | Never |
| SHA-1 | 2^160 | Weak | Hours (cluster) | Legacy only |
| SHA-256 | 2^256 | Good | ~10^18 years | Yes |
| SHA-512 | 2^512 | Strong | ~10^58 years | Yes |
| bcrypt | Work factor | Best | Adjustable | Yes — for passwords |
| Argon2 | Configurable | Best | Memory-hard | Yes — winner of PHC |
💡 For password storage, always use a purpose-built password hashing function (bcrypt, Argon2, scrypt) — never raw SHA-256. They are deliberately slow and resistant to GPU attacks.