What is password entropy and how is it measured?▾
Entropy is a measure of unpredictability, expressed in bits. For a password, it is approximately log₂(character set size) × length. A password using 62 characters (letters + digits) at 12 characters long has roughly 71 bits of entropy. Higher entropy means more guesses are required to crack it.
Why does NIST SP 800-63B discourage complexity rules?▾
NIST research found that complexity rules (must include uppercase, digit, symbol) produce predictable patterns — users write P@ssw0rd1 instead of a long unpredictable passphrase. Length and avoiding known patterns delivers more entropy than mixing character classes.
What crack time is considered safe?▾
For online attacks (rate-limited to ~100–1,000 guesses per second), even moderate entropy passwords are practically safe. For offline attacks against fast hashes (bcrypt, Argon2), 60+ bits of entropy is widely recommended. Passwords protecting encryption keys or privileged access should target 80+ bits.
Is a password with a high entropy score immune to phishing?▾
No. Entropy measures resistance to guessing attacks only. Phishing, keyloggers, credential databases, and session hijacking compromise passwords regardless of their strength. A strong password should always be paired with multi-factor authentication.
Why do common substitutions like @ for a not improve the score?▾
Password crackers use substitution rulesets — replacing a with @ or i with 1 is standard practice in dictionary-rule attacks. The tool detects L33t substitutions and discounts them from the entropy score because they add little unpredictability against modern cracking tools.
Is it safe to type my real password into this tool?▾
The tool runs entirely in your browser and never transmits any input to a server. However, as general security practice, avoid typing active account passwords into any third-party tool. Use the tool to evaluate candidate passwords before setting them, not to test passwords already in use.
How does the tool detect keyboard walks like 'qwerty' or '12345'?▾
Keyboard pattern detection maps standard keyboard layouts and identifies sequences of adjacent keys in horizontal, vertical, and diagonal directions. These sequences are among the first tried in automated attacks and are flagged as low-entropy regardless of length.
What is a good password length by current standards?▾
NIST 800-63B recommends at least 8 characters as a minimum, but security professionals broadly recommend 16+ characters for high-value accounts. A random 16-character lowercase-only password has ~75 bits of entropy — stronger than a 10-character complex password that follows predictable patterns.