Create strong passwords with letters, numbers and symbols, generated locally in your browser.
What entropy actually measures
Password entropy, measured in bits, quantifies how unpredictable a password is. Each bit doubles the number of possible combinations an attacker must try. A password with 40 bits of entropy has about 1 trillion possibilities; 80 bits, about 1 septillion.
Entropy is calculated as log₂(possible values). For a 10-character password drawn uniformly from 95 printable ASCII characters: log₂(95^10) ≈ 65.7 bits. The key assumption — uniform random draw — is where most real passwords fail.
Why real passwords lose entropy
"Password123!" technically contains 12 characters from a 95-character alphabet (78.8 theoretical bits), but its actual entropy is much lower. Attackers use dictionaries, substitution rules, and leaked password lists; common patterns fall in seconds regardless of length.
The difference between theoretical and effective entropy is the entire attack surface. The NIST SP 800-63B guidelines explicitly drop older complexity rules because they pushed users toward predictable patterns ("Password1!", "Summer2024!") that looked complex but were trivially cracked.
How cracking attacks really work
Modern cracking is not raw brute force. Attackers layer strategies from cheapest to most expensive:
- Leaked password reuse: try passwords from breach databases (billions of credentials)
- Dictionary attacks: words from many languages plus common modifications
- Rule-based: apply transformations (capitalize first, append numbers, common substitutions)
- Mask attacks: test specific patterns inferred from policy hints
- Hybrid: dictionary + brute-force on short suffixes
- Pure brute force: only for short passwords where other methods have failed
Length beats complexity
Given random selection, length is mathematically the strongest defense. Each additional random character adds ~6.6 bits of entropy from a 95-character alphabet. Adding complexity rules that increase the alphabet but reduce user-random behavior often makes passwords weaker in practice.
The Diceware method, recommended by the EFF, combines 5–7 random words from a 7,776-word list. A 6-word passphrase gives log₂(7776^6) ≈ 77.5 bits of entropy — roughly equivalent to a 12-character random ASCII password, but far easier to memorize.
Modern targets for password strength
Current guidance converges on minimum targets calibrated against hardware available to well-funded attackers:
- 60 bits: resists casual attackers, bare minimum
- 80 bits: current recommended floor for general use
- 100 bits: strong; resists well-funded adversaries
- 128 bits: cryptographic strength; overkill for password purposes
The role of password managers
The most scalable answer is a password manager. It generates a unique, random, high-entropy password for every service, freeing you from memorization and eliminating password reuse — the single largest cause of account takeovers.
Recommended practice: protect the manager with a strong master passphrase (memorable but high entropy), enable multi-factor authentication on the manager itself, and use its autofill to resist phishing (an autofiller will not fill a password into a fake look-alike domain).
Beyond the password
No password is strong enough to stand alone today. Multi-factor authentication (MFA) using a hardware key (FIDO2/WebAuthn) or a TOTP app massively raises the bar for account takeover even if the password itself leaks.
Passkeys, built on the WebAuthn standard, are gradually replacing passwords entirely on major platforms. They use public-key cryptography bound to your device, cannot be phished, and cannot be reused. Where available, passkeys are strictly better than any password.
Founder of UtilizAí, with a background in Blockchain, Cryptocurrencies and Finance in the Digital Era, plus complementary studies in Theology, Philosophy and ongoing coursework in Speech-Language Pathology. Learn more.
Frequently asked questions
How often should I change my password?
NIST SP 800-63B explicitly recommends against periodic mandatory password changes. Forced rotation pushes users toward predictable patterns. Change a password only when there is evidence of compromise, upon breach notification, or when moving to a stronger method like passkeys.
Is a long password better than a complex one?
For equivalent randomness, yes — mathematically, length beats complexity. A 16-character random password is much stronger than an 8-character password with symbols. Passphrases (5+ random words) are typically more memorable and at least as strong as traditional passwords.
Are password managers safe to trust?
Reputable password managers use zero-knowledge encryption, meaning they cannot read your data even if their servers are breached. Well-audited managers have a far better security track record than human memory and password reuse. The marginal risk is well below the benefit.
What is a passphrase?
A passphrase is a password made of multiple unrelated words, like "correct-horse-battery-staple" (from the famous xkcd comic). It is long (high entropy from length), easier to memorize than random characters, and strongly recommended for master passwords where memorization is required.
How strong is MFA really?
MFA blocks over 99% of automated account takeover attempts according to Microsoft’s 2019 study. Hardware keys (FIDO2) are essentially phish-proof. SMS-based MFA is weakest because of SIM-swap attacks, but still far better than a password alone. Enable it wherever offered.
Related guides
A clear guide to QR codes: the anatomy of the code, capacity and error correction levels, common use cases, and best practices for reliable scanning.
A practical guide to image compression: how JPEG, PNG, WebP, and AVIF work, lossy vs lossless, best use cases per format, and quality-size tradeoffs.
Understand PDF encryption: standard vs strong encryption, user vs owner passwords, common security flags, how redaction works, and real-world limits of PDF security.
Understand Base64 encoding: what problem it solves, the standard alphabet, padding rules, variants (URL-safe, MIME), performance tradeoffs, and common mistakes.