They might seem unbreakable when you don't consider various facts, like people choosing their passwords themselves rarely use the whole key space when doing so. Even when big key space is supported, people still usually pick something simpler if complexity is not enforced by other means. Unless you're not trying to target an individual account with strong password, various cracking methods can be quite effective. Best way to ensure you're not among the easy targets is to refer to the hundreds of best practices documented online. Like the ones already mentioned in this thread.bester69 wrote:any full ASCII word with just a lenth >=8 characters is unbreakable unless there are several supercomputers working in that brute attack decoding. There is no regular home computer in world able to break a full ASCII word of just 8 characters
You're not defining new paradigm here by stating that 8-10 character password is adequate for all purposes, with every hash algorithm, with or without salting. Frankly, I think you're naive to think that 8-10 characters is future proof with conventional computing hardware, let alone quantum computers which I believe you have even less insight than cryptography.
You are pulling facts from you rear to support a broken idea of re-inventing something (password salting) which is already properly done elsewhere.