Password Entropy Calculator

Calculate the exact entropy of any password configuration. See bits of randomness, total combinations, and estimated crack times at real-world attack speeds.

Use + D to bookmark this tool
pwgen — entropy calculator
guest@pwgen:~$ entropy --length=16 --upper --lower --digits --symbols
105.1
Entropy (bits)
4.7 × 10²⁸
Combinations
150 years
Crack time (GPU)
95
Pool size
excellent · ~105 bits
Online (1K/s): · GPU fast (10B/s): · Bcrypt (100K/s):
length
16
charset
custom pool
[info] pure math — no pattern analysis · use strength checker for real passwords
[info] all calculations run locally · nothing is transmitted

What Is Password Entropy?

Password entropy is a measure of how unpredictable a password is, expressed in bits. It comes from Claude Shannon's information theory and quantifies the randomness in a password's construction. The formula is simple:

entropy = length × log₂(pool_size)

Each bit of entropy doubles the number of possible passwords. A password with 40 bits of entropy has 2⁴⁰ ≈ 1 trillion possible combinations. At 80 bits, there are 2⁸⁰ ≈ 1.2 × 10²⁴ combinations — more than the estimated number of grains of sand on Earth. At 128 bits, brute-forcing becomes infeasible even for nation-state attackers.

Entropy by Configuration

LengthLower (26)Lower+Digits (36)Mixed+Digits (62)All ASCII (95)
837.6 bits41.4 bits47.6 bits52.6 bits
1256.4 bits62.0 bits71.5 bits78.8 bits
1675.2 bits82.7 bits95.3 bits105.1 bits
2094.0 bits103.4 bits119.1 bits131.4 bits
24112.8 bits124.1 bits142.9 bits157.7 bits

Values assume truly random character selection from the full pool. Real passwords with patterns or dictionary words have lower effective entropy.

Crack Time at Different Speeds

EntropyOnline (1K/s)GPU Fast (10B/s)Bcrypt (100K/s)
30 bits12 daysinstantly3 hours
40 bits35 years2 min127 days
50 bits36K years1.3 days357 years
60 bits37M years3.7 years366K years
80 bits3.8 × 10¹³ years3.8M years383B years
100 bits4 × 10¹⁹ years4 × 10¹² years4 × 10¹⁷ years
128 bits1.1 × 10²⁸ years1.1 × 10²¹ years1.1 × 10²⁶ years

Times represent worst case (full keyspace). Online assumes rate-limited login attempts. GPU assumes MD5/SHA-1 hashing. Bcrypt assumes cost factor 10.

How to Increase Entropy

Increase Length (Most Effective)

Length has the biggest impact on entropy. Each additional character adds log₂(pool_size) bits — about 6.6 bits per character with the full ASCII set. Doubling password length doubles the entropy. Going from 8 to 16 characters increases combinations from 10¹⁵ to 10³¹.

Expand Character Set

Adding character types increases the pool size. Lowercase only = 26 chars (4.7 bits/char). Add uppercase = 52 (5.7 bits/char). Add digits = 62 (5.95 bits/char). Add symbols = 95 (6.57 bits/char). For a 16-character password, switching from lowercase to full ASCII adds 30 bits — equivalent to adding 6 extra lowercase characters.

Use Full Randomness

Entropy calculations assume every character is chosen uniformly at random from the pool. If you pick characters yourself, you'll unconsciously favor certain letters, avoid symbols, and create patterns. Always use a cryptographic random generator like our Password Generator.

Avoid Patterns

Dictionary words, keyboard walks, repeated characters, and common substitutions (@ for a, 3 for e) dramatically reduce effective entropy. "P@ssw0rd!123" has 78 bits of theoretical entropy but near-zero effective entropy because it's in every attacker's wordlist.

Entropy vs Real-World Security

Pure entropy assumes randomnessThe formula only holds if every character is chosen uniformly at random from the full pool
Patterns reduce effective entropyDictionary words, keyboard walks, and repeated characters make passwords far weaker than their theoretical entropy
🛡
Use strength tester for real passwordsOur Password Strength Checker analyzes actual patterns and penalties
80+ bits is strong for random passwordsWith truly random generation, 80 bits provides excellent protection against all known attack methods

More Security Tools

🔒

Password Generator

Generate strong, random passwords with customizable length, character sets, and options.

💬

Passphrase Generator

Generate strong, memorable passphrases from random words. Easier to remember, just as secure.

🧠

Memorable Password Generator

Create easy to remember passwords from random words or your own phrases with leet speak conversion.

Bulk Password Generator

Generate multiple unique passwords at once. Perfect for IT admins and account provisioning.

🔑

API Key Generator

Generate cryptographically secure API keys, tokens, and secrets in multiple formats.

📡

WiFi Password Generator

Generate strong, easy-to-share WiFi passwords for your home or office network.

📱

WiFi QR Code Generator

Create a scannable QR code for your WiFi network. Guests connect instantly.

🔓

WiFi QR to Password Converter

Extract the WiFi password from a QR code image. Upload or paste — no camera needed.

🔢

PIN Generator

Generate cryptographically random PIN codes. Perfect for device locks and access codes.

🛡

Password Strength Checker

Test how strong your password is. See estimated crack time, entropy, and suggestions.

#️⃣

MD5 Hash Generator

Generate MD5 hashes from any text. Useful for checksums, cache keys, and legacy system compatibility.

#️⃣

SHA-512 Hash Generator

Generate SHA-512 hashes using the native Web Crypto API. 512-bit security for signatures and integrity.

Login Barcode Generator

Generate a Code 128 barcode that types username, TAB, password, ENTER into login forms when scanned.

📺

Easy-Type Password Generator

Generate passwords optimized for TVs, game consoles, and devices with on-screen keyboards. No symbols.

🗣

Pronounceable Password Generator

Generate speakable passwords from fake syllables. Easy to say aloud, type from memory, and share verbally.

🌈

Password Generator for Kids

Generate fun, memorable passwords children can actually remember. Word stories: red-panda-jumps-42.

Frequently Asked Questions

What is password entropy?

Password entropy measures the randomness of a password in bits. It's calculated as length × log₂(pool size), where pool size is the number of possible characters. Higher entropy means more combinations an attacker must try. A truly random 16-character password using all ASCII printable characters has about 105 bits of entropy.

How many bits of entropy do I need?

For most online accounts, 60+ bits provides solid protection against brute-force attacks. For high-security applications like encryption keys or password manager master passwords, aim for 80+ bits. At 128 bits, your password is effectively uncrackable by any known or foreseeable technology.

Does entropy guarantee a password is secure?

No. Entropy assumes the password is truly random. A password like 'aaaaaaaaaaaaaaaa' is 16 characters but has near-zero effective entropy because it follows an obvious pattern. Use our Password Strength Checker to analyze real passwords with pattern detection. This calculator shows theoretical maximum entropy for a given configuration.

Why does length matter more than character set?

Entropy grows linearly with length but only logarithmically with pool size. Doubling the length doubles the entropy bits, while doubling the character set only adds one bit per character. A 20-character lowercase password (94 bits) is stronger than a 10-character password using all character types (65 bits).

What attack speed should I assume?

It depends on the threat model. Online attacks are limited to about 1,000 guesses/sec by rate limiting. Offline GPU attacks against weak hashes (MD5) can reach 10 billion guesses/sec. Against strong hashes like bcrypt, attackers are limited to about 100,000 guesses/sec. We show crack times for all three scenarios.

Is any data stored or transmitted?

No. All calculations run entirely in your browser using JavaScript. No passwords or parameters are sent to any server. You can verify by checking the network tab in your browser's developer tools.

Copied to clipboard ✓