A user picks “P@ssw0rd!” for a production database — uppercase, lowercase, digits, symbols, so the strength meter shows green. An attacker with a leaked hash cracks it in under a second because the pattern is in every wordlist on the planet. Raw charset math is not real password entropy. Actual resistance depends on whether the pattern is predictable, not whether it ticks complexity checkboxes.
Enter a password to see entropy in bits, crack times under different attack scenarios, and which patterns were detected.
Entropy in Bits: What the Number Actually Measures
Entropy quantifies uncertainty. A random 8-character password from 95 printable ASCII characters carries about 52.6 bits — meaning roughly 251.6 guesses on average. Each added bit doubles the work. The catch: the formula assumes every character is chosen uniformly at random. Humans do not pick randomly, which is why pattern detection matters more than charset size.
Pattern Detection — Why “P@ssw0rd!” Scores Lower Than It Looks
Smart estimators like NIST SP 800‑63B recommend checking against breached lists and common patterns rather than relying on complexity rules. Keyboard walks (qwerty, zxcvbn), leet-speak (@ for a, 0 for o), and appended symbols are patterns attackers try first. A 9-character password using three of these might show 52 bits of theoretical entropy but only 20 bits once patterns are factored in.
Crack-Time Scenarios: Online Throttled vs Offline GPU Attack
Online attacks hit rate limits — maybe 10–100 guesses per second, so even 30 bits buys years. Offline attacks against a stolen hash run at billions per second on modern GPUs — the same 30-bit password falls instantly. The output shows both scenarios so you can judge whether the password survives the threat model that applies.
Passphrases vs Complex Strings — The Length Advantage
“correct horse battery staple” is 28 characters with only lowercase and spaces, yet beats most 10-character symbol strings because each word draws from thousands. Length dominates charset. Four Diceware words yield about 51 bits; five words yield 64. Easier to type, easier to remember, harder to crack. Use a password manager — do not reuse passphrases across services.
Score Decoded: Reading Your Strength Report
The output shows entropy in bits, detected patterns, and crack times for online and offline attacks. Below 40 bits is weak under any scenario. 40–60 bits survives online throttling but not an offline GPU rig. Above 60 resists most practical attacks — though no score guarantees safety if the password sits in a breach list.
Practical Q&A on Password Hygiene
- Keyboard walks look random but are not. “qwerty” and “zxcvbn” use a large charset yet appear in every attack dictionary. The estimator flags these and penalises entropy accordingly.
- Unicode and emoji break more than they help. High entropy on paper, but many login forms strip or reject non-ASCII input — silently truncating what you thought was a strong password.
- bcrypt’s 72-byte cap. Anything past byte 72 is silently ignored. A 100-character passphrase hashed with bcrypt is only as strong as its first 72 bytes.
Habits that undermine good entropy: reusing the same strong password across services (one breach exposes all), and trusting a green meter without checking public breach databases.
Related tools: Regex Tester for validating password-policy patterns in code, API Rate Limit Planner for throttling login endpoints against brute force, SLA Uptime Calculator for availability targets on auth services, and CIDR Subnet Calculator for network segments isolating credential stores.
Entropy scores and crack times are educational approximations — they do not guarantee resistance to all attacks. Never treat a high score as proof a password is uncrackable. Use a password manager and unique credentials per service.