PDFUnlock Guide
How to Unlock an Acrobat 10+ PDF (AES-256 Encryption)
Honest guide to unlocking PDFs created with Adobe Acrobat 10 or later using AES-256 encryption. What the ~20% success rate means, why it is harder, and when recovery is realistic.
· PDFUnlock Team
Adobe Acrobat X (10) and all later versions use AES-256 encryption by default. This is the strongest encryption available in the PDF standard, and it represents a significant challenge for password recovery. We believe in being upfront: the success rate for AES-256 PDFs is approximately 15-25%, and only weak or commonly used passwords can be recovered.
This guide gives you an honest assessment of what to expect, explains why AES-256 is so much harder to crack, and helps you determine whether recovery is worth attempting for your specific situation.
Why AES-256 Is the Toughest PDF Encryption
AES-256 is the same encryption standard used by governments and militaries worldwide. The 256-bit key length means there are 2^256 possible keys — a number so incomprehensibly large that even every computer on Earth working together could not test them all before the heat death of the universe.
But the story is more nuanced than “unbreakable.” Password cracking does not attack the encryption key directly. It attacks the human-chosen password that derives the key. If the password is “Summer2024”, the encryption might as well be AES-1024 — the weakness is the password, not the algorithm.
Why AES-256 is harder than AES-128:
- The hashing algorithm is significantly more computationally expensive. Acrobat 10+ uses a modified SHA-256 based key derivation with many more rounds than Acrobat 9’s approach.
- GPU cracking speed drops dramatically: a modern RTX 4090 tests roughly 1-3 million candidates per second on AES-256 (Hashcat mode 10600/10700), compared to 3-5 million for AES-128.
- The slower speed means that brute-force searches that would succeed against AES-128 in hours would take weeks or months against AES-256.
The bottom line: AES-256 encryption itself is unbreakable. But passwords created by humans often are not. The question is whether your specific password is weak enough to be found by a smart dictionary attack.
Realistic Success Rates: What the Numbers Mean
The ~20% average success rate breaks down like this:
Passwords that WILL be found (~20% of cases):
- Common passwords: “password”, “123456”, “admin”, “letmein”
- Simple dictionary words: “sunshine”, “football”, “dragon”
- Dictionary word + number: “michael1”, “company2023”
- Basic patterns: “abcdef”, “qwerty123”, “aaaaaa”
- Previously leaked passwords (from breaches of other services)
Passwords that MIGHT be found (with luck):
- Dictionary word with basic mutations: “P@ssw0rd”, “Summ3r!”
- Two short words combined: “bluesky”, “hotdog”
- Short passwords under 7 characters regardless of complexity
Passwords that will NOT be found:
- Random strings from password managers: “kJ7#mP2$xL9@nQ4”
- Long passphrases: “correct horse battery staple”
- Any password longer than 10 characters with mixed character types
- Randomly generated passwords of any meaningful length
We share these numbers because we believe transparency builds trust. If you recognize your password habits in the first category, recovery is likely. If your PDF was protected by a password manager, the honest answer is that recovery is not realistic.
How to Identify AES-256 Encryption
Using Adobe Acrobat Reader: Open File > Properties > Security. If the encryption method shows “AES 256-bit” and references Acrobat X or later compatibility, you have AES-256.
Using PDFUnlock: Upload your file to pdfunlock.app. The analysis identifies the exact encryption type within seconds and gives you a clear success estimate before you commit to anything.
Version reference:
- Acrobat X (10) — AES-256 (revision 5)
- Acrobat XI (11) — AES-256 (revision 6)
- Acrobat DC (2015+) — AES-256 (revision 6)
- Acrobat 2020/2024 — AES-256 (revision 6)
All of these use the same underlying encryption strength. There is no meaningful difference in cracking difficulty between a PDF from Acrobat 10 and one from Acrobat 2024.
The Recovery Process for AES-256
The same 12-phase approach is used, but expectations should be calibrated differently:
Phase 1 — Top common passwords (seconds). Tests the 1,000 most common passwords. With AES-256 PDFs, this phase actually has a decent hit rate because people who use common passwords use them everywhere — including for “important” encrypted documents.
Phase 2 — Extended dictionary (minutes). Runs through 14.3 million known leaked passwords. This phase is where most AES-256 recoveries happen, because the password was reused from another service that was subsequently breached.
Phase 3 — Dictionary with rules (minutes to hours). Applies hundreds of transformation rules to dictionary words. This catches passwords like “Company2024!” or “Firstname99”. The slower hashing speed of AES-256 means this phase takes noticeably longer than with AES-128.
Phase 4 — Advanced rules (many hours). Exhaustive mutations of dictionary words. Due to the computational cost of each hash, this phase can run for 12-24 hours on AES-256 versus a few hours on AES-128.
Phase 5 — Targeted brute force (days). Systematic testing of all short combinations. For AES-256, this realistically covers passwords up to 5-6 characters. Beyond that, the time required becomes impractical.
When Recovery Is Worth Trying
Given the 15-25% success rate, you should consider whether the document is valuable enough to justify the attempt. The good news: with PDFUnlock’s pay-on-success model, the only thing you risk is time.
Recovery IS worth trying if:
- You suspect the password is a common word, name, or simple pattern
- The PDF was created in a business context where simple passwords are typical
- You partly remember the password (this dramatically improves odds)
- The document is important enough that even a 20% chance is worth pursuing
- You have nothing to lose — PDFUnlock charges nothing if the password is not found
Recovery is UNLIKELY to succeed if:
- The password was generated by a password manager
- You know the password is long and random
- The document comes from a security-conscious organization that enforces strong password policies
Maximizing Your Chances
If you decide to attempt recovery, a few strategies can help:
Provide everything you remember. Even vague recollections help. “I think it started with a capital letter and had a number at the end” or “it might have been related to my dog’s name” — this kind of information, if recovery tools can use it to create targeted rules, can push success rates above 50% for AES-256.
Think about your password habits. Do you reuse passwords? Do you follow a pattern (word + year + symbol)? Do you use the same base word with variations? Your answers to these questions can help focus the attack.
Check other sources first. Before launching a recovery attempt, exhaust the free options: search your email for the password, check your password manager, look for notes in your desk or phone, contact the person who sent you the file.
Step-by-Step Recovery
- Upload your PDF to pdfunlock.app.
- Review the analysis. The system confirms AES-256, shows the success estimate (~20%), and is transparent about the difficulty.
- Decide whether to proceed. There is no pressure. If the estimated odds are too low for your situation, you lose nothing.
- Wait for results. AES-256 recovery takes longer — potentially 24-48 hours for a full 12-phase run. Provide your email to be notified.
- Pay only if found. If the password is recovered, you pay to reveal it. If not, you pay nothing.
Conclusion
AES-256 is the strongest encryption in the PDF world, and we will not pretend otherwise. The ~20% success rate means that four out of five AES-256 PDFs remain locked. But that one in five represents real people getting access to documents that matter to them — tax filings, legal records, research papers, personal archives.
If your document is important and you think the password might be something a human would typically choose, start with a free analysis at PDFUnlock. You will know within seconds what encryption you are dealing with, and you will never pay a cent unless the password is actually found.