FixThatApp

Password Strength Checker Guide: What Makes a Password Secure in 2026

Updated March 19, 2026

Most people think a strong password means adding a capital letter and an exclamation mark to a word they can remember. Modern password crackers take less than a second to defeat that strategy. This guide covers what actually determines password strength, how attackers approach cracking passwords, why some common advice is outdated, and what current security guidelines recommend instead.

What Makes a Password Strong

Password strength comes down to four factors, in roughly this order of importance:

  1. Length — The single most important factor. Every additional character multiplies the number of possible passwords exponentially. A 16-character password is not twice as strong as an 8-character password — it's billions of times stronger.
  2. Character diversity — Using uppercase letters, lowercase letters, digits, and special characters expands the "alphabet" of possible characters per position. A password drawn from 95 printable ASCII characters is significantly harder to crack than one using only 26 lowercase letters.
  3. Randomness — A random sequence of characters is far harder to crack than a word, phrase, or predictable pattern. "xK9#mP2&vL" is much stronger than "Password1!" even though both have similar length and character mix, because the former is genuinely random.
  4. Uniqueness — A password that has never been used before (and that hasn't appeared in a data breach) cannot be found in credential databases that attackers use for stuffing attacks. Reusing passwords across sites is one of the most dangerous password habits.

How Password Strength Is Measured: Entropy

Password entropy is a measure of unpredictability, expressed in bits. It's calculated as:

Entropy (bits) = log2(pool_size ^ password_length)
             = password_length × log2(pool_size)

Where pool_size is the number of possible characters at each position. For common character sets:

Character SetPool SizeBits per Character
Lowercase letters only26~4.7 bits
Lowercase + digits36~5.2 bits
Upper + lower + digits62~5.95 bits
All printable ASCII95~6.57 bits

A password with 80+ bits of entropy is considered very strong against brute-force attacks with current hardware. That corresponds to roughly 12 truly random characters from a full ASCII character set, or about 17 random lowercase letters.

Time to Crack: A Practical Reference

These estimates assume a fast offline attack (a leaked hash being cracked), which represents the worst-case scenario. Online attacks against live services are much slower due to rate limiting.

Password ExampleTypeEst. Time to Crack
dog3-char lowercaseInstant
pass1234Common word + digitsInstant (in wordlists)
Summer2024!Word + year + symbolSeconds to minutes
Tr0ub4dor&3Substitution patternHours (pattern is known)
xK9#mP2v8-char random mixedHours to days
xK9#mP2vLq!812-char random mixedCenturies
correct-horse-battery-staple4 random wordsCenturies (high entropy)

Check Your Password Strength Now

Test any password against our strength checker — nothing is sent to a server.

Open Password Strength Checker

Common Password Patterns to Avoid

Keyboard Walks

Sequences typed in a visual pattern on the keyboard — qwerty, 123456, qweasdzxc, 1qaz2wsx — are among the first patterns any automated attack tries. They feel complex to type but are simple to generate algorithmically.

Leetspeak Substitutions

Replacing letters with visually similar characters — @ for "a", 3 for "e", 0 for "o", 1 for "l" — was once considered a meaningful security enhancement. Modern cracking tools include full leetspeak dictionaries. p@ssw0rd cracks as fast as password because the substitution patterns are well-known and baked into attack dictionaries.

Predictable Appendages

Adding "1" or "123" or "!" to the end of an otherwise weak password is the most common password pattern in the world. Analysis of leaked databases consistently shows that a large percentage of all passwords follow the structure: word + digits + optional punctuation at the end. Crackers specifically model this pattern. soccer1! is barely stronger than soccer.

Personal Information

Birthdays, pet names, children's names, addresses, and sports teams are predictable because they can often be researched or guessed from public information. Social engineering attacks and targeted cracking specifically look for these patterns. Never use information about yourself in a password.

How Attackers Crack Passwords

Brute Force

The simplest attack: try every possible combination systematically. Modern GPU-accelerated cracking rigs can test billions of combinations per second. Short passwords (under 8 characters) fall to brute force almost regardless of character set.

Dictionary Attacks

Rather than trying random combinations, dictionary attacks test a curated list of likely passwords: common words, names, places, leaked passwords from previous breaches, and their common variations (capitalizations, substitutions, number appendages). Most dictionary lists contain hundreds of millions of entries. A password that looks complex to a human but follows a predictable pattern will often be in these lists.

Credential Stuffing

When a data breach exposes a large set of username/password pairs, attackers reuse those exact credentials against other services. This is why password reuse is so dangerous — a breach at one low-security service hands attackers working credentials for your email, banking, and other accounts. Using a unique password for every account completely neutralizes credential stuffing.

The Passphrase Alternative

A passphrase — four or five genuinely random words strung together — is often the best balance of memorability and security. The famous "correct horse battery staple" example from the xkcd comic illustrates the principle. Four random common English words from a vocabulary of ~7,000 words gives approximately:

log2(7000^4) ≈ 51 bits of entropy

Five words: ~64 bits. Six words: ~77 bits. This is comparable to a 12-character random mixed-case alphanumeric password, but far easier to remember and type accurately. The key requirement is that the words must be genuinely random — not a phrase, not a song lyric, not a sequence of words that "makes sense." Meaningful phrases have far lower entropy because they're drawn from a much smaller space of likely combinations.

Use a Password Manager The practical solution to the password problem is a password manager. It generates and stores a unique, long, random password for every account — you only need to remember one strong master password (a passphrase works well here). Services like Bitwarden (open source, free tier available) make this workflow seamless across devices.

NIST Password Guidelines (2024)

NIST Special Publication 800-63B, last updated in 2024, made significant changes to the conventional wisdom about password requirements:

How to Use the Password Strength Checker

  1. Open the Password Strength Checker.
  2. Type or paste a password into the input field. The analysis happens entirely in your browser — nothing is sent to any server.
  3. The tool displays a strength rating, estimated entropy in bits, and the estimated time to crack under a fast offline attack.
  4. Feedback highlights specific weaknesses: dictionary words found, common patterns detected, character diversity gaps, and length considerations.
  5. Use the feedback to iteratively improve the password, or discard it and generate a new random one using our password generator.