
Tests Show $30,000 AI GPUs Are Terrible Password Crackers — RTX 5090 Gaming GPU Outperforms Nvidia H200 and AMD MI300X
Companies Mentioned
Why It Matters
The findings expose a cost‑efficiency mismatch, showing enterprises that consumer GPUs still deliver superior value for security testing and penetration‑testing tools. This challenges assumptions that expensive AI accelerators can double as universal compute engines.
Key Takeaways
- •RTX 5090 beats H200 and MI300X in all tested hash algorithms.
- •AI GPUs lag due to limited INT32 cores for password cracking.
- •Consumer GPUs remain most cost‑effective for security testing workloads.
- •Hashcat performance favors architectures optimized for 32‑bit integer ops.
- •Specops study highlights limited versatility of $30k datacenter GPUs.
Pulse Analysis
The rapid evolution of datacenter‑grade AI GPUs has driven prices to the $30,000 range, prompting speculation that these powerhouses could serve secondary roles once AI demand stabilizes. Security professionals, however, have long relied on consumer graphics cards for password‑recovery tasks because such workloads depend heavily on 32‑bit integer arithmetic, a domain where traditional GPUs excel. By testing Nvidia’s H200, AMD’s MI300X, and the consumer‑focused RTX 5090 with Hashcat, researchers aimed to validate whether the massive investment in AI hardware translates into broader computational utility.
Benchmark results were unequivocal: the RTX 5090 outperformed both AI GPUs across MD5, NTLM, bcrypt, SHA‑256 and SHA‑512 hashes. While the H200 and MI300X are engineered for tensor‑core operations—FP8, BF16, INT8—they possess fewer INT32 execution units, limiting their effectiveness in hash‑cracking scenarios that rely on integer math. Even though the MI300X boasts higher raw INT32 throughput than the RTX 5090, software optimizations in Hashcat favor Nvidia’s architecture, further widening the performance gap. In practical terms, the RTX 5090 delivered up to 93.5% faster SHA‑512 cracking than the H200, underscoring the architectural mismatch.
For organizations tasked with security assessments, the study reinforces that consumer GPUs remain the most cost‑effective solution for password‑cracking and related penetration‑testing activities. Investing in $30k AI accelerators solely for secondary workloads would yield diminishing returns, diverting budget from more impactful security tools. As AI workloads continue to dominate GPU design, vendors may need to consider hybrid architectures or dedicated security accelerators if they wish to capture this ancillary market. Until then, the conventional desktop GPU retains its niche as the go‑to engine for high‑speed hash cracking.
Tests show $30,000 AI GPUs are terrible password crackers — RTX 5090 gaming GPU outperforms Nvidia H200 and AMD MI300X
Comments
Want to join the conversation?
Loading comments...