Password Entropy and Strength: The Math Behind Strong Passwords

Understand password entropy, how cracking attacks actually work, why length beats complexity, and how to use passphrases and password managers effectively.
Related tool
Strong Password Generator

Create strong passwords with letters, numbers and symbols, generated locally in your browser.

What entropy actually measures

Password entropy, measured in bits, quantifies how unpredictable a password is. Each bit doubles the number of possible combinations an attacker must try. A password with 40 bits of entropy has about 1 trillion possibilities; 80 bits, about 1 septillion.

Entropy is calculated as log₂(possible values). For a 10-character password drawn uniformly from 95 printable ASCII characters: log₂(95^10) ≈ 65.7 bits. The key assumption — uniform random draw — is where most real passwords fail.

Why real passwords lose entropy

"Password123!" technically contains 12 characters from a 95-character alphabet (78.8 theoretical bits), but its actual entropy is much lower. Attackers use dictionaries, substitution rules, and leaked password lists; common patterns fall in seconds regardless of length.

The difference between theoretical and effective entropy is the entire attack surface. The NIST SP 800-63B guidelines explicitly drop older complexity rules because they pushed users toward predictable patterns ("Password1!", "Summer2024!") that looked complex but were trivially cracked.

How cracking attacks really work

Modern cracking is not raw brute force. Attackers layer strategies from cheapest to most expensive:

  • Leaked password reuse: try passwords from breach databases (billions of credentials)
  • Dictionary attacks: words from many languages plus common modifications
  • Rule-based: apply transformations (capitalize first, append numbers, common substitutions)
  • Mask attacks: test specific patterns inferred from policy hints
  • Hybrid: dictionary + brute-force on short suffixes
  • Pure brute force: only for short passwords where other methods have failed

Length beats complexity

Given random selection, length is mathematically the strongest defense. Each additional random character adds ~6.6 bits of entropy from a 95-character alphabet. Adding complexity rules that increase the alphabet but reduce user-random behavior often makes passwords weaker in practice.

The Diceware method, recommended by the EFF, combines 5–7 random words from a 7,776-word list. A 6-word passphrase gives log₂(7776^6) ≈ 77.5 bits of entropy — roughly equivalent to a 12-character random ASCII password, but far easier to memorize.

Modern targets for password strength

Current guidance converges on minimum targets calibrated against hardware available to well-funded attackers:

  • 60 bits: resists casual attackers, bare minimum
  • 80 bits: current recommended floor for general use
  • 100 bits: strong; resists well-funded adversaries
  • 128 bits: cryptographic strength; overkill for password purposes

The role of password managers

The most scalable answer is a password manager. It generates a unique, random, high-entropy password for every service, freeing you from memorization and eliminating password reuse — the single largest cause of account takeovers.

Recommended practice: protect the manager with a strong master passphrase (memorable but high entropy), enable multi-factor authentication on the manager itself, and use its autofill to resist phishing (an autofiller will not fill a password into a fake look-alike domain).

Beyond the password

No password is strong enough to stand alone today. Multi-factor authentication (MFA) using a hardware key (FIDO2/WebAuthn) or a TOTP app massively raises the bar for account takeover even if the password itself leaks.

Passkeys, built on the WebAuthn standard, are gradually replacing passwords entirely on major platforms. They use public-key cryptography bound to your device, cannot be phished, and cannot be reused. Where available, passkeys are strictly better than any password.

About the author
RC
Renato Candido dos Passos
Fundador e especialista em Blockchain, Fonoaudiologia e Finanças

Founder of UtilizAí, with a background in Blockchain, Cryptocurrencies and Finance in the Digital Era, plus complementary studies in Theology, Philosophy and ongoing coursework in Speech-Language Pathology. Learn more.

Frequently asked questions

How often should I change my password?

NIST SP 800-63B explicitly recommends against periodic mandatory password changes. Forced rotation pushes users toward predictable patterns. Change a password only when there is evidence of compromise, upon breach notification, or when moving to a stronger method like passkeys.

Is a long password better than a complex one?

For equivalent randomness, yes — mathematically, length beats complexity. A 16-character random password is much stronger than an 8-character password with symbols. Passphrases (5+ random words) are typically more memorable and at least as strong as traditional passwords.

Are password managers safe to trust?

Reputable password managers use zero-knowledge encryption, meaning they cannot read your data even if their servers are breached. Well-audited managers have a far better security track record than human memory and password reuse. The marginal risk is well below the benefit.

What is a passphrase?

A passphrase is a password made of multiple unrelated words, like "correct-horse-battery-staple" (from the famous xkcd comic). It is long (high entropy from length), easier to memorize than random characters, and strongly recommended for master passwords where memorization is required.

How strong is MFA really?

MFA blocks over 99% of automated account takeover attempts according to Microsoft’s 2019 study. Hardware keys (FIDO2) are essentially phish-proof. SMS-based MFA is weakest because of SIM-swap attacks, but still far better than a password alone. Enable it wherever offered.

Related guides