Password complexity matters

PDF 1.4-1.6 RC4 128-bit Encryption — Hashcat Mode 10500

TL;DR — PDF 1.4 (Acrobat 5/6) extended the Standard Security Handler to V=2 with a configurable 40-128 bit key length. Most files in this revision use the full 128-bit key, which puts the recovery problem firmly back into the password-strength domain — exhaustive key search is no longer tractable, so recovery feasibility now depends on what the original password actually was.

What PDF 1.4 changed

Released in 2001 alongside Acrobat 5.0, PDF 1.4 introduced V=2 and R=3 in the Standard Security Handler. The cipher remained RC4, but the key length became configurable from 40 bits up to 128 bits in 8-bit steps. From this point onward, virtually every commercial tool that produced password-protected PDFs defaulted to 128-bit.

PDF 1.5 (Acrobat 6, 2003) and PDF 1.6 (Acrobat 7, 2004) reused V=2/R=3 for password protection. Acrobat 7 also introduced V=4/R=4 with AES-128 as an option, but RC4 remained the default for several more years for compatibility.

The encrypt dictionary now carries `/V 2 /R 3 /Length 128`. The Length field is mandatory for V=2 because it is no longer fixed by the algorithm version.

  • V (algorithm version) = 2
  • R (revision) = 3
  • Length: 40-128 bits (almost always 128)
  • Cipher: RC4 with full configurable key length
  • Padding: same Standard Security Handler 32-byte string

Why 128-bit recovery is fundamentally different

At 128 bits, the keyspace expands to 2^128 ≈ 3.4 × 10^38 — a number large enough that no realistic compute budget can exhaust it. The relevant constraint shifts from the cryptographic key to the password itself: the key derivation function (still based on MD5 and the 32-byte padding) is deterministic, so given a candidate password, a verifier can be computed and compared against the stored O/U values from the encrypt dictionary.

Practically, this means recovery for mode 10500 follows the rules of password attack rather than cryptographic attack. If the original password is short, predictable, dictionary-based, or built from common patterns (year, name, simple substitutions), recovery is feasible on reasonable timescales. If it is long, random, and high-entropy, recovery becomes asymptotically intractable.

There is no shortcut at the cipher level. RC4 has theoretical biases (FMS attack on related-key reuse, for example), but PDF's key-derivation function isolates the cipher key from the user password's input directly, so these attacks do not apply.

What 'feasibility' actually means here

Recovery feasibility for 128-bit RC4 PDFs lives on a spectrum, not a binary outcome. The single biggest predictor is whether you can give the recovery service hints about what the password is likely to look like — common pattern, length range, an old password you used to use, the year the file was created, the document author's name. Hints that narrow the search space turn an intractable brute force into a directed search.

A 6-character lowercase-only password is recovered very quickly because the keyspace is tiny (26^6 ≈ 308 million). A 12-character mixed-case password with digits and symbols is roughly 10^23 times harder. The same algorithm; the same hardware; entirely different recovery curves.

We don't publish specific recovery probabilities because they depend heavily on what the password is. What we will say: if you remember the rough shape of the password (length, character classes, a few words you might have used), provide that context up front. It is the difference between a practical recovery and a calculation that finishes after the heat-death of the sun.

Acrobat 6 and the 'compatibility tier' problem

Acrobat 6 (2003) was the first version to default to 128-bit RC4 for password-protected exports. It also introduced the per-permission encryption controls (printing allowed, copying allowed, modification allowed) that organisations relied on for distribution control.

Permission flags are stored in the P field of the encrypt dictionary as a signed 32-bit integer. They can be read without the password. However, the cipher itself encrypts strings and streams unconditionally — so even if you can read the permissions field, you can't read content without decrypting first.

A common misconception is that 'owner password' is fundamentally different from 'user password' for recovery purposes. They aren't: the owner password is hashed into a key that decrypts a 'real' user password (the O/U pair), and the document is encrypted with the user-password-derived key. Mode 10500 recovers the user password, which provides full read access regardless of which password type was originally set.

Files commonly in this revision

PDF 1.4-1.6 with 128-bit RC4 dominates the 'corporate-era' encrypted PDF population: mid-2000s tax filings, legal disclosure exports, payroll bundles, contractor SOWs, and bank statements from the 2003-2010 window. Many small-business document management systems standardised on Acrobat 6 or 7 and continued producing this format for years afterward.

Government archives are heavy in this revision because procurement cycles for desktop software are long. UK HMRC PDFs, Australian ATO documents, US IRS notices, and Canadian CRA notices from this era are predominantly mode 10500 with 128-bit keys.

Modern Acrobat (XI, DC, Pro 2020+) defaults to AES-256 (mode 10700), so freshly generated files are usually not in this category. But anything re-saved from an older template, or generated by an automation pipeline that wasn't updated, can still emerge as 128-bit RC4.

Practical questions for owners considering recovery

Three questions determine whether recovery is realistic in your case. First: do you have any memory of the password's general shape? A length range, a likely word, a favourite number — these narrow the search dramatically. Second: was the password generated by a password manager, or chosen by a human? Manager-generated passwords are random and high-entropy by design and typically out of reach; human-chosen passwords cluster around predictable patterns. Third: what is the document worth? A free check costs nothing and gives you a quick technical readout; a paid attempt is justified when the document has clear value.

The honest assessment for mode 10500 is that recovery success rates depend on password type. We won't quote a single number. We will tell you what we found in the free-check phase before you commit to anything paid.

Frequently Asked Questions

Is mode 10500 always recoverable like mode 10400?
No. Mode 10400 (40-bit) is effectively guaranteed because the keyspace is finite. Mode 10500 (128-bit) reduces to a password-strength problem — feasibility depends on what the password actually was. Strong random passwords are not realistically recoverable.
How can I tell if my PDF is mode 10500 vs 10400?
Check the encrypt dictionary for V/R/Length. V=1, R=2 → mode 10400 (40-bit). V=2, R=3, Length=128 → mode 10500 (128-bit). Tools like qpdf --show-encryption, pdfinfo, or pikepdf print this without needing the password.
Does providing a hint really help?
Yes — substantially. A hint that constrains length and character classes can turn an infeasible search into a tractable one. A hint that's a known prefix or known word reduces the search space exponentially. Hints are the single biggest controllable factor in mode 10500 recovery.
Is RC4 considered broken in 2026?
RC4 was deprecated for TLS by RFC 7465 (2015) due to keystream biases. For PDF, the practical threat is exhaustive search of the password-derived key, not RC4 cipher weaknesses — which means PDF 1.4-1.6 isn't 'broken' by RC4 attacks, but it isn't strong either: AES-256 (mode 10700) is the modern equivalent.
What about owner passwords vs user passwords?
Both are processed through the Standard Security Handler. The owner password ultimately encrypts a user-password-derived key; for recovery purposes, recovering the user password unlocks the document. There's no recovery-time advantage to either path.
Will the recovered file lose digital signatures?
No. Digital signatures are independent of password encryption. A recovered (unlocked) PDF retains all signatures intact. The signature validates against the unlocked content the same way it validated against the locked content for a legitimate reader.
Are there any cipher-level attacks on PDF RC4?
Academic attacks against RC4 (Fluhrer-Mantin-Shamir, AlFardan et al., NOMORE) require either related-key conditions or millions of ciphertexts encrypted with the same key — neither applies to PDF, where the cipher key is per-document. So in practice, mode 10500 recovery is password-strength-bound, not cipher-bound.
What if the document was created by a third party and they used a password manager?
If the file was protected with a high-entropy password from a generator, recovery is most likely infeasible. Mode 10500 with a strong random password is, in practical terms, secure against currently economic compute budgets. The honest path is to ask the original creator for the password — recovery won't work.

Related references

Have a file in this category?

Start with a free analysis. The encryption type is detected in your browser, then a free check runs through fast techniques before any paid attempt. You only pay if a recovery actually works.

Run a free PDF analysis