Password Strength Checker

Test how strong your password is. See estimated crack time, entropy, and get actionable suggestions. Nothing leaves your browser.

Use + D to bookmark this tool
pwgen — check strength
guest@pwgen:~$ check strength --analyze
[info] your password is analyzed locally — never transmitted
[info] we check against common patterns, dictionary words, and known breaches

How Password Strength Is Measured

Password strength is primarily measured in bits of entropy — a mathematical measure of randomness. Higher entropy means more possible combinations an attacker must try. A truly random password's entropy is calculated as: entropy = length × log₂(pool_size)

However, real-world password strength depends on more than just character count. Our checker also analyzes patterns (keyboard walks, repeated characters), common substitutions (@ for a, 3 for e), dictionary words, and known breached passwords to give a more realistic strength estimate.

Entropy vs. Crack Time

EntropyCombinationsGPU Crack TimeRatingExample
20 bits1 million< 1 secondInstant4-digit PIN
35 bits34 billion3.4 secondsWeak6-char lowercase
50 bits1.1 quadrillion1.3 daysFair8-char mixed case
65 bits3.7 × 10¹⁹117 yearsStrong10-char alphanumeric
80 bits1.2 × 10²⁴3.8M yearsExcellent14-char all types
128 bits3.4 × 10³⁸10²⁰ yearsOverkill20-char random

GPU crack times assume 10 billion guesses/sec (hashcat with MD5/SHA-1). Bcrypt/Argon2 hashing makes these 10,000x–100,000x slower.

Common Password Mistakes

Dictionary Words

Using real words — even obscure ones — drastically reduces entropy. Attackers use dictionaries with millions of words, names, and phrases. "sunshine", "monkey", and "shadow" are in every cracking wordlist.

Predictable Substitutions

Replacing 'a' with '@', 'e' with '3', 'o' with '0' feels clever but adds almost zero security. Cracking tools apply these substitution rules automatically. "P@ssw0rd" is no stronger than "Password".

Keyboard Patterns

"qwerty", "asdfgh", "zxcvbn", "1qaz2wsx" — these patterns are in every attacker's ruleset. Even diagonal patterns like "qazwsx" are well-known and tested early in any attack.

Personal Information

Names, birthdays, pet names, sports teams, and cities are the first things targeted attackers try. Social media makes this information trivially available. Never use anything personally identifiable.

Password Strength by Character Pool

Character SetPool SizeBits/Char8-Char Entropy12-Char Entropy
Digits only103.326.6 bits39.9 bits
Lowercase264.737.6 bits56.4 bits
Mixed case525.745.6 bits68.4 bits
Alphanumeric625.9547.6 bits71.5 bits
All printable ASCII956.5752.6 bits78.8 bits

These are theoretical maximums for truly random passwords. Real passwords with patterns, words, or repetition have significantly less effective entropy.

Understanding Crack Times

Online Attack (1,000/sec)

Rate-limited web login attempts. Most sites lock accounts after a few failures. Even a weak password might survive, but you shouldn't rely on this.

Offline Attack — CPU (10M/sec)

Attacker has stolen hashed passwords and is cracking them on a standard computer. Bcrypt and Argon2 hashing slows this dramatically.

Offline Attack — GPU (10B/sec)

Modern GPUs can compute billions of hashes per second for weak algorithms like MD5 or SHA-1. This is the standard we test against.

Massive Cluster (1T/sec)

Nation-state level resources. Even at this speed, a 20-character random password from the full ASCII set would take billions of years.

More Security Tools

Frequently Asked Questions

Is my password sent anywhere?

No. All analysis happens in your browser using JavaScript. Nothing is transmitted over the network. You can verify by checking your browser's developer tools network tab while using this tool.

What score should I aim for?

80+ is excellent for most purposes. For critical accounts (banking, email, password manager master password), aim for 90+. Below 40 means your password is vulnerable.

Why is my 'complex' password scored low?

Common patterns like "P@ssw0rd!" use predictable substitutions that attackers check first. Real strength comes from randomness and length, not clever tricks.

My password is long but scores poorly?

Length alone isn't enough. "aaaaaaaaaaaaaaaa" is 16 characters but trivially crackable. Repeated characters, dictionary words, and common phrases reduce effective entropy significantly.

How is crack time calculated?

We estimate time based on 10 billion guesses per second (modern GPU cluster with MD5/SHA-1). Real crack times depend on the hashing algorithm used — bcrypt and Argon2 are 10,000x slower to crack.

Should I trust online password checkers?

Only if they run entirely in your browser. Our tool never transmits your password — all analysis is client-side JavaScript. Avoid any checker that requires you to submit your password to a server.

Copied to clipboard ✓