Password Strength Checker Guide: What Makes a Password Secure in 2026
Most people think a strong password means adding a capital letter and an exclamation mark to a word they can remember. Modern password crackers take less than a second to defeat that strategy. This guide covers what actually determines password strength, how attackers approach cracking passwords, why some common advice is outdated, and what current security guidelines recommend instead.
What Makes a Password Strong
Password strength comes down to four factors, in roughly this order of importance:
- Length — The single most important factor. Every additional character multiplies the number of possible passwords exponentially. A 16-character password is not twice as strong as an 8-character password — it's billions of times stronger.
- Character diversity — Using uppercase letters, lowercase letters, digits, and special characters expands the "alphabet" of possible characters per position. A password drawn from 95 printable ASCII characters is significantly harder to crack than one using only 26 lowercase letters.
- Randomness — A random sequence of characters is far harder to crack than a word, phrase, or predictable pattern. "xK9#mP2&vL" is much stronger than "Password1!" even though both have similar length and character mix, because the former is genuinely random.
- Uniqueness — A password that has never been used before (and that hasn't appeared in a data breach) cannot be found in credential databases that attackers use for stuffing attacks. Reusing passwords across sites is one of the most dangerous password habits.
How Password Strength Is Measured: Entropy
Password entropy is a measure of unpredictability, expressed in bits. It's calculated as:
Entropy (bits) = log2(pool_size ^ password_length)
= password_length × log2(pool_size)
Where pool_size is the number of possible characters at each position. For common character sets:
| Character Set | Pool Size | Bits per Character |
|---|---|---|
| Lowercase letters only | 26 | ~4.7 bits |
| Lowercase + digits | 36 | ~5.2 bits |
| Upper + lower + digits | 62 | ~5.95 bits |
| All printable ASCII | 95 | ~6.57 bits |
A password with 80+ bits of entropy is considered very strong against brute-force attacks with current hardware. That corresponds to roughly 12 truly random characters from a full ASCII character set, or about 17 random lowercase letters.
Time to Crack: A Practical Reference
These estimates assume a fast offline attack (a leaked hash being cracked), which represents the worst-case scenario. Online attacks against live services are much slower due to rate limiting.
| Password Example | Type | Est. Time to Crack |
|---|---|---|
dog | 3-char lowercase | Instant |
pass1234 | Common word + digits | Instant (in wordlists) |
Summer2024! | Word + year + symbol | Seconds to minutes |
Tr0ub4dor&3 | Substitution pattern | Hours (pattern is known) |
xK9#mP2v | 8-char random mixed | Hours to days |
xK9#mP2vLq!8 | 12-char random mixed | Centuries |
correct-horse-battery-staple | 4 random words | Centuries (high entropy) |
Check Your Password Strength Now
Test any password against our strength checker — nothing is sent to a server.
Open Password Strength CheckerCommon Password Patterns to Avoid
Keyboard Walks
Sequences typed in a visual pattern on the keyboard — qwerty, 123456, qweasdzxc, 1qaz2wsx — are among the first patterns any automated attack tries. They feel complex to type but are simple to generate algorithmically.
Leetspeak Substitutions
Replacing letters with visually similar characters — @ for "a", 3 for "e", 0 for "o", 1 for "l" — was once considered a meaningful security enhancement. Modern cracking tools include full leetspeak dictionaries. p@ssw0rd cracks as fast as password because the substitution patterns are well-known and baked into attack dictionaries.
Predictable Appendages
Adding "1" or "123" or "!" to the end of an otherwise weak password is the most common password pattern in the world. Analysis of leaked databases consistently shows that a large percentage of all passwords follow the structure: word + digits + optional punctuation at the end. Crackers specifically model this pattern. soccer1! is barely stronger than soccer.
Personal Information
Birthdays, pet names, children's names, addresses, and sports teams are predictable because they can often be researched or guessed from public information. Social engineering attacks and targeted cracking specifically look for these patterns. Never use information about yourself in a password.
How Attackers Crack Passwords
Brute Force
The simplest attack: try every possible combination systematically. Modern GPU-accelerated cracking rigs can test billions of combinations per second. Short passwords (under 8 characters) fall to brute force almost regardless of character set.
Dictionary Attacks
Rather than trying random combinations, dictionary attacks test a curated list of likely passwords: common words, names, places, leaked passwords from previous breaches, and their common variations (capitalizations, substitutions, number appendages). Most dictionary lists contain hundreds of millions of entries. A password that looks complex to a human but follows a predictable pattern will often be in these lists.
Credential Stuffing
When a data breach exposes a large set of username/password pairs, attackers reuse those exact credentials against other services. This is why password reuse is so dangerous — a breach at one low-security service hands attackers working credentials for your email, banking, and other accounts. Using a unique password for every account completely neutralizes credential stuffing.
The Passphrase Alternative
A passphrase — four or five genuinely random words strung together — is often the best balance of memorability and security. The famous "correct horse battery staple" example from the xkcd comic illustrates the principle. Four random common English words from a vocabulary of ~7,000 words gives approximately:
log2(7000^4) ≈ 51 bits of entropy
Five words: ~64 bits. Six words: ~77 bits. This is comparable to a 12-character random mixed-case alphanumeric password, but far easier to remember and type accurately. The key requirement is that the words must be genuinely random — not a phrase, not a song lyric, not a sequence of words that "makes sense." Meaningful phrases have far lower entropy because they're drawn from a much smaller space of likely combinations.
NIST Password Guidelines (2024)
NIST Special Publication 800-63B, last updated in 2024, made significant changes to the conventional wisdom about password requirements:
- Length matters most — Minimum 8 characters for user-created passwords; 6 for machine-generated. Longer minimums (15+) are encouraged for privileged accounts.
- No mandatory complexity rules — NIST no longer recommends forcing uppercase, special characters, or specific character type requirements. These rules push users toward predictable patterns (capitalizing the first letter, adding "!" at the end) without meaningfully increasing security.
- No mandatory periodic resets — Forcing password changes every 30, 60, or 90 days leads users to make minimal changes (Password1 → Password2) that weaken rather than strengthen security. NIST recommends only changing passwords when there is evidence of compromise.
- Check against breached password lists — New and changed passwords should be checked against databases of known compromised credentials (like the Have I Been Pwned dataset). Passwords found in breach databases should be rejected regardless of their complexity.
- No password hints or security questions — These create additional attack vectors and should be avoided.
How to Use the Password Strength Checker
- Open the Password Strength Checker.
- Type or paste a password into the input field. The analysis happens entirely in your browser — nothing is sent to any server.
- The tool displays a strength rating, estimated entropy in bits, and the estimated time to crack under a fast offline attack.
- Feedback highlights specific weaknesses: dictionary words found, common patterns detected, character diversity gaps, and length considerations.
- Use the feedback to iteratively improve the password, or discard it and generate a new random one using our password generator.