Password Strength Analyzer

Analyze how strong your password is in real time. Checks length, character variety, common patterns, and estimates time to crack.

Ad
Ad

About Password Strength Analyzer

A password's strength depends on its length, character variety, and unpredictability. This analyzer evaluates all three in real time, showing a strength rating, entropy in bits, estimated crack time, and a detailed checklist of what to improve. Your password never leaves your browser - all analysis runs locally in JavaScript.

What Gets Checked

The analyzer evaluates eight criteria and shows a pass/fail indicator for each one.

CheckRequirementWhy It Matters
Minimum length8+ charactersShort passwords are trivially brute-forced
Recommended length12+ charactersEach extra character multiplies the search space exponentially
Uppercase lettersAt least 1Expands the character pool from 26 to 52
Lowercase lettersAt least 1Required for mixed-case strength
NumbersAt least 1Adds 10 characters to the pool
Special charactersAt least 1Adds 30+ characters to the pool
Common password checkNot in known breach listsAttackers try known passwords first
Pattern detectionNo keyboard walks or sequences"qwerty123" and "abcdef" are among the first things attackers test

How Entropy Is Calculated

Entropy measures the theoretical unpredictability of a password in bits. The formula is: entropy = length x log2(pool size). The pool size depends on which character types are used.

Character Types UsedPool Size8-char Entropy12-char Entropy16-char Entropy
Lowercase only (a-z)2637.6 bits56.4 bits75.2 bits
Lower + upper (a-z, A-Z)5245.6 bits68.4 bits91.2 bits
Lower + upper + digits6247.6 bits71.5 bits95.3 bits
All printable ASCII9552.6 bits78.8 bits105.1 bits

This calculation assumes each character is chosen randomly. If the password contains dictionary words or patterns, the effective entropy is lower because attackers use smarter strategies than pure brute force.

Estimated Crack Time

The crack time estimate assumes an offline attack at 10 billion guesses per second, which represents a well-equipped attacker using multiple GPUs against an unsalted fast hash like MD5 or SHA-1. Against properly hashed passwords (bcrypt with cost 10), the effective rate drops to roughly 10,000 guesses per second.

Attack ScenarioGuesses per SecondTypical Context
Online attack (rate-limited)10-1,000Login form with lockout after failed attempts
Offline, fast hash (MD5)10 billion+Leaked database with weak hashing
Offline, bcrypt (cost 10)~10,000Properly hashed password database
Offline, Argon2id~1,000Modern best-practice password storage

This is why password hashing matters as much as password strength. A 12-character password that would fall in hours against MD5 could last centuries against bcrypt. For hashing passwords, see the Bcrypt Hash Generator.

Strength Rating Scale

RatingEntropy RangeTypical PasswordAssessment
Very Weak0-25 bits"password" or "123456"Cracked instantly by any attacker
Weak25-40 bits"Summer2024"Falls to dictionary attacks within minutes
Fair40-60 bits"Tr0pic@l99"Resists casual attacks but vulnerable to dedicated effort
Strong60-80 bits"kX9!mPq2vL#n"Good for most accounts with proper hashing
Very Strong80+ bits"correct-horse-battery-staple" or 16+ random charsEffectively uncrackable through brute force

Passwords found in known breach databases are always rated Very Weak regardless of their apparent complexity. "P@ssw0rd!" looks complex but appears in virtually every breach list.

Common Password Mistakes

MistakeExampleWhy It Fails
Dictionary word with simple substitutionp@$$w0rdAttackers run "leet speak" variations automatically
Keyboard walkqwerty, zxcvbnListed in every cracking dictionary
Name + yearMichael1990Attackers combine name lists with date ranges
Short with all character typesAb1!Only 4 characters - brute-forced in seconds
Reusing across sitesSame password everywhereOne breach compromises all your accounts
Sequential patternsabcd1234Among the first patterns attackers try

What Makes a Good Password

The most effective passwords are long and random. A 4-word passphrase like "correct-horse-battery-staple" (inspired by the well-known XKCD comic) has about 44 bits of entropy from a standard dictionary, but using a larger word list or adding random characters pushes it much higher. A 16-character random string from a password generator typically exceeds 100 bits of entropy.

StrategyExampleApproximate EntropyEase of Recall
Random characters (16)kX9!mPq2vL#nR8&w105 bitsVery hard - use a password manager
Passphrase (4 words, large list)marble-vortex-plume-dusk~77 bitsModerate - memorable with practice
Passphrase + random modifiermarble-vortex-plume-dusk-42!~90 bitsModerate
Sentence-based mnemonicIbmFc@2:30pM!~85 bitsGood if you remember the sentence

The best approach for most people is to use a password manager that generates and stores random passwords. You only need to remember one strong master password.

Password Requirements by Service

Service TypeTypical MinimumRecommended
Banking / Financial8-12 characters16+ characters, enable 2FA
Email (primary)8 characters16+ characters, unique, enable 2FA
Social media6-8 characters12+ characters, enable 2FA
WiFi (WPA2/WPA3)8 characters20+ characters (offline attacks are fast)
Password manager master12 characters20+ characters or strong passphrase

Need to generate a strong password from scratch? The Password Generator creates random passwords with configurable length and character types. For encrypting sensitive text with a password, the Encryption Tool uses AES-256-GCM. All analysis runs entirely in your browser - your password is never transmitted or stored.

Frequently Asked Questions

How is the crack time calculated?

The tool estimates how long a brute-force attack would take assuming 10 billion password guesses per second, which represents a powerful offline attack using GPUs. It calculates the total possible combinations based on the character pool size and password length, then divides by the guess rate.

Is this different from the Password Generator?

Yes. The Password Generator creates new random passwords for you. The Password Strength Analyzer checks existing passwords you already have or are considering using, and tells you how strong they are with specific improvement suggestions.

What makes a password "Very Strong"?

A Very Strong password typically has 16 or more characters, uses uppercase and lowercase letters plus numbers and special characters, avoids common words and keyboard patterns, and has high entropy (80+ bits). The longer and more random, the better.

Is my password sent anywhere during analysis?

No. All analysis runs entirely in your browser using JavaScript. Your password never leaves your device and is not stored or transmitted.

Why does my 12-character password score lower than expected?

Length alone is not enough. If your password uses only lowercase letters or follows a common pattern like "password1234", it will score lower. The analyzer checks for character variety, common passwords, keyboard patterns, and sequential characters alongside length.

Link to this tool

Copy this HTML to link to this tool from your website or blog.

<a href="https://toolboxkit.io/tools/password-strength-analyzer/" title="Password Strength Analyzer - Free Online Tool">Try Password Strength Analyzer on ToolboxKit.io</a>