🔐Password Strength Checker

Analyze password strength using entropy calculations, estimate crack time, get security suggestions, and generate strong passwords.

Prefer to skip the form? Scroll down and Ask AI Instead. Just describe your situation and let AI handle the math for you in seconds.

Password Strength

Strong

"MyP..." strength: Strong (72 bits entropy). Offline crack time: 80 thousand years. Generated password: F}.7*P1(IK$Sf0^?

StrengthStrong
Entropy (bits)72
Length11
Crack Time (Offline)80 thousand years
Crack Time (Online)billions of years
SuggestionsUse at least 12 characters
Generated Strong PasswordF}.7*P1(IK$Sf0^?

Password Security Analysis

72

94

11

Advertisement

728 × 90

✦ Ask AI Instead

Password Strength Checker: How Strong Is My Password and How to Improve It

Use this password strength checker to find out how strong your password is before trusting it to protect a real account. The tool measures password entropy in bits, estimates how long a brute-force attack would take to crack it, checks for common weak patterns, and generates a stronger alternative if needed. Understanding what actually makes a password secure helps you build better habits across all your accounts.

Check Password Strength Online Free

Password strength is not a matter of opinion. It is a function of mathematics. The core metric is password entropy, measured in bits. Entropy tells you how many guesses an attacker would need to exhaust all possible combinations. Every bit of entropy doubles the number of guesses required. A password with 40 bits of entropy requires about 1 trillion guesses to crack on average. A password with 80 bits requires over 1 quadrillion times more guesses than that.

Entropy depends on two things: the number of characters in the password (length) and the size of the pool of possible characters. A pool that includes lowercase letters, uppercase letters, numbers, and special characters has up to 94 possible values per position. A pool using only lowercase letters has 26. Each character you add to the length multiplies the total combinations by the pool size, which is why length drives security more than any other single factor.

This checker evaluates:

  • Presence of uppercase letters (adds 26 characters to the pool)
  • Presence of lowercase letters (adds 26 characters to the pool)
  • Presence of numbers (adds 10 characters to the pool)
  • Presence of special characters such as symbols (adds 32 characters to the pool)
  • Total password length
  • Presence of common dictionary words and predictable patterns

Passwords containing common words like "password," "admin," "letmein," or "dragon" are flagged as weak regardless of their calculated entropy, because dictionary attacks and credential stuffing attacks target these patterns first.

How to Make a Strong Secure Password

The most important rule for creating a strong, secure password is to prioritize length. A 16-character password using only lowercase letters has more entropy than a 6-character password using every possible character type. Consider the numbers: "P@ss1!" has 6 characters from a 94-character pool, giving about 35 bits of entropy. A 16-character lowercase passphrase from a 26-character pool gives about 75 bits of entropy. The longer password is far harder to crack by brute force despite using a smaller character set.

This does not mean complexity is irrelevant. Adding uppercase letters, numbers, and symbols to a long password increases the pool size and pushes entropy higher still. The ideal approach combines both: use a long password (16 or more characters) and include a mix of character types. Avoid predictable substitutions like replacing "a" with "@" or "o" with "0," because modern cracking tools account for these patterns.

Passphrases offer a practical middle ground. A sequence of four or five random common words, such as "correct horse battery staple," is easy to remember and produces very high entropy because of the length. At 25 lowercase characters from a 26-character pool, that passphrase yields over 117 bits of entropy, which would take longer than the current age of the universe to brute force even with advanced hardware running at a billion guesses per second.

NIST guidelines in SP 800-63B explicitly recommend prioritizing length and dropping arbitrary complexity rules that push users toward predictable patterns. Requirements like "must contain one uppercase, one number, and one symbol" tend to produce passwords like "Password1!" which score poorly despite technically meeting the requirements. A longer, randomly constructed password is always preferable.

Password Security Score and Crack Time Estimator

This tool shows two crack time estimates: an offline attack estimate and an online attack estimate. In an offline attack, an attacker has already obtained a hashed version of your password from a data breach and is running cracking software directly on their own hardware. Modern GPU clusters can test billions of password combinations per second, which is why the offline crack time estimate assumes one billion guesses per second as a baseline.

Online attacks are much slower. Login systems apply rate limiting, account lockouts, and CAPTCHA verification that restrict attackers to a small number of guesses per second. The same weak password that falls instantly to an offline brute-force attack might take years to crack through an online login portal. This is why password reuse across multiple sites is so dangerous: a breach at one low-security site that stores passwords in plaintext or weak hashes exposes your password to an instant offline crack, which then unlocks every other account where you reused the same password.

Two-factor authentication (2FA) adds a critical second layer of defense. Even if an attacker obtains your password, they cannot access your account without the second factor, typically a time-based one-time code from an authenticator app. Enabling 2FA on email, banking, and social media accounts is one of the highest-impact security decisions you can make, independent of password strength.

Frequently Asked Questions

What makes a password strong?

Password strength comes from length and character variety. A longer password exponentially increases the number of combinations an attacker must try. Including uppercase letters, lowercase letters, numbers, and special characters expands the pool of possible values per position, further increasing entropy. A strong password avoids common words, predictable substitutions (like "@" for "a"), and reuse across multiple accounts. A minimum of 12 to 16 characters is recommended for most accounts, with 20 or more for high-value accounts like email and banking.

How long would it take to crack my password?

Crack time depends on password entropy (bits) and the speed of the attack. At one billion guesses per second, a 40-bit entropy password falls in under 18 minutes on average, while an 80-bit entropy password would take billions of years. This calculator estimates both an offline crack time (at one billion guesses per second, simulating a hardware-based attack on a stolen hash) and an online crack time (at approximately one thousand guesses per second, simulating a rate-limited login form).

What is password entropy?

Password entropy is a measure of unpredictability expressed in bits. It is calculated as the password length multiplied by the base-2 logarithm of the character pool size. A pool of 94 printable ASCII characters gives about 6.55 bits per character. A 12-character password using all character types has roughly 78 bits of entropy, meaning an attacker would need to try an average of 2 to the power of 77 guesses to crack it. Higher entropy means exponentially harder to crack.

What is the minimum length for a secure password?

NIST and most cybersecurity frameworks recommend a minimum of 12 characters for general accounts and 16 or more characters for high-value accounts such as email, banking, or password manager master passwords. Length is the single biggest driver of password security. A 12-character random password using all character types has approximately 79 bits of entropy, which is computationally infeasible to brute-force with current technology. Shorter passwords, even with full complexity, are significantly more vulnerable.