Password Entropy Calculator
Calculate the exact entropy of any password configuration. See bits of randomness, total combinations, and estimated crack times at real-world attack speeds.
Use ⌘ + D to bookmark this toolCalculate the exact entropy of any password configuration. See bits of randomness, total combinations, and estimated crack times at real-world attack speeds.
Use ⌘ + D to bookmark this toolPassword entropy is a measure of how unpredictable a password is, expressed in bits. It comes from Claude Shannon's information theory and quantifies the randomness in a password's construction. The formula is simple:
entropy = length × log₂(pool_size)
Each bit of entropy doubles the number of possible passwords. A password with 40 bits of entropy has 2⁴⁰ ≈ 1 trillion possible combinations. At 80 bits, there are 2⁸⁰ ≈ 1.2 × 10²⁴ combinations — more than the estimated number of grains of sand on Earth. At 128 bits, brute-forcing becomes infeasible even for nation-state attackers.
| Length | Lower (26) | Lower+Digits (36) | Mixed+Digits (62) | All ASCII (95) |
|---|---|---|---|---|
| 8 | 37.6 bits | 41.4 bits | 47.6 bits | 52.6 bits |
| 12 | 56.4 bits | 62.0 bits | 71.5 bits | 78.8 bits |
| 16 | 75.2 bits | 82.7 bits | 95.3 bits | 105.1 bits |
| 20 | 94.0 bits | 103.4 bits | 119.1 bits | 131.4 bits |
| 24 | 112.8 bits | 124.1 bits | 142.9 bits | 157.7 bits |
Values assume truly random character selection from the full pool. Real passwords with patterns or dictionary words have lower effective entropy.
| Entropy | Online (1K/s) | GPU Fast (10B/s) | Bcrypt (100K/s) |
|---|---|---|---|
| 30 bits | 12 days | instantly | 3 hours |
| 40 bits | 35 years | 2 min | 127 days |
| 50 bits | 36K years | 1.3 days | 357 years |
| 60 bits | 37M years | 3.7 years | 366K years |
| 80 bits | 3.8 × 10¹³ years | 3.8M years | 383B years |
| 100 bits | 4 × 10¹⁹ years | 4 × 10¹² years | 4 × 10¹⁷ years |
| 128 bits | 1.1 × 10²⁸ years | 1.1 × 10²¹ years | 1.1 × 10²⁶ years |
Times represent worst case (full keyspace). Online assumes rate-limited login attempts. GPU assumes MD5/SHA-1 hashing. Bcrypt assumes cost factor 10.
Length has the biggest impact on entropy. Each additional character adds log₂(pool_size) bits — about 6.6 bits per character with the full ASCII set. Doubling password length doubles the entropy. Going from 8 to 16 characters increases combinations from 10¹⁵ to 10³¹.
Adding character types increases the pool size. Lowercase only = 26 chars (4.7 bits/char). Add uppercase = 52 (5.7 bits/char). Add digits = 62 (5.95 bits/char). Add symbols = 95 (6.57 bits/char). For a 16-character password, switching from lowercase to full ASCII adds 30 bits — equivalent to adding 6 extra lowercase characters.
Entropy calculations assume every character is chosen uniformly at random from the pool. If you pick characters yourself, you'll unconsciously favor certain letters, avoid symbols, and create patterns. Always use a cryptographic random generator like our Password Generator.
Dictionary words, keyboard walks, repeated characters, and common substitutions (@ for a, 3 for e) dramatically reduce effective entropy. "P@ssw0rd!123" has 78 bits of theoretical entropy but near-zero effective entropy because it's in every attacker's wordlist.
Generate strong, random passwords with customizable length, character sets, and options.
Generate strong, memorable passphrases from random words. Easier to remember, just as secure.
Create easy to remember passwords from random words or your own phrases with leet speak conversion.
Generate multiple unique passwords at once. Perfect for IT admins and account provisioning.
Generate cryptographically secure API keys, tokens, and secrets in multiple formats.
Generate strong, easy-to-share WiFi passwords for your home or office network.
Create a scannable QR code for your WiFi network. Guests connect instantly.
Extract the WiFi password from a QR code image. Upload or paste — no camera needed.
Generate cryptographically random PIN codes. Perfect for device locks and access codes.
Test how strong your password is. See estimated crack time, entropy, and suggestions.
Generate MD5 hashes from any text. Useful for checksums, cache keys, and legacy system compatibility.
Generate SHA-512 hashes using the native Web Crypto API. 512-bit security for signatures and integrity.
Generate a Code 128 barcode that types username, TAB, password, ENTER into login forms when scanned.
Generate passwords optimized for TVs, game consoles, and devices with on-screen keyboards. No symbols.
Generate speakable passwords from fake syllables. Easy to say aloud, type from memory, and share verbally.
Generate fun, memorable passwords children can actually remember. Word stories: red-panda-jumps-42.
Password entropy measures the randomness of a password in bits. It's calculated as length × log₂(pool size), where pool size is the number of possible characters. Higher entropy means more combinations an attacker must try. A truly random 16-character password using all ASCII printable characters has about 105 bits of entropy.
For most online accounts, 60+ bits provides solid protection against brute-force attacks. For high-security applications like encryption keys or password manager master passwords, aim for 80+ bits. At 128 bits, your password is effectively uncrackable by any known or foreseeable technology.
No. Entropy assumes the password is truly random. A password like 'aaaaaaaaaaaaaaaa' is 16 characters but has near-zero effective entropy because it follows an obvious pattern. Use our Password Strength Checker to analyze real passwords with pattern detection. This calculator shows theoretical maximum entropy for a given configuration.
Entropy grows linearly with length but only logarithmically with pool size. Doubling the length doubles the entropy bits, while doubling the character set only adds one bit per character. A 20-character lowercase password (94 bits) is stronger than a 10-character password using all character types (65 bits).
It depends on the threat model. Online attacks are limited to about 1,000 guesses/sec by rate limiting. Offline GPU attacks against weak hashes (MD5) can reach 10 billion guesses/sec. Against strong hashes like bcrypt, attackers are limited to about 100,000 guesses/sec. We show crack times for all three scenarios.
No. All calculations run entirely in your browser using JavaScript. No passwords or parameters are sent to any server. You can verify by checking the network tab in your browser's developer tools.