If you care about the security of someone's password, you should move away from PBDKF2, and at least to BCrypt. Look at the state of the art in cracking hardware.
For BCrypt cracking in hardware, look at High-Speed Implementation of bcrypt Password
Search using Special-Purpose Hardware.
| Algorithm | hashes/sec | hashes/sec/Watt |
|------------|------------|-----------------|
| BCrypt(12) | 410.4 | 20.52 |
| BCrypt(5) | 51,437 | 2,572 |
They create a custom ASIC (the "Virtex-7"), that is 10x faster than a CPU (and 30x faster than a video card), and uses 6% of the power of either.
That is state of the art of cracking BCrypt password. Now compare that with PBKDF2. I have a 2.5W USB stick that calculates 350M hashes per second. You can try 1,000 iterations, 5,000 iterations, and even it iOS standard 10,000 iterations:
| Algorithm | hashes/sec | hashes/sec/Watt |
|-------------|------------|-----------------|
| BCrypt(12) | 410.4 | 20.52 |
| BCrypt(5) | 51,437 | 2,572 |
| PBKDF2(10k) | 35,000 | 14,000 |
| PBKDF2(5k) | 70,000 | 28,000 |
| PBKDF2(1k) | 350,000 | 140,000 |
Each of the 2.5W USB sticks costs about $8 (i have 14 of them connected to my server).
- Virtex-7 custom ASIC: $3,495
- USB stick: $8
Using the costs
| Algorithm | hashes/sec | hashes/sec/Watt | hashes/sec/$ |
|-------------|------------|-----------------|--------------|
| BCrypt(12) | 410.4 | 20.52 | 0.1174 |
| BCrypt(5) | 51,437 | 2,572 | 14.717 |
| PBKDF2(10k) | 35,000 | 14,000 | 4,375 |
| PBKDF2(5k) | 70,000 | 28,000 | 8,750 |
| PBKDF2(1k) | 350,000 | 140,000 | 43,750 |