~ / root / password-strength /

PASSWORD.STRENGTH

[ READY ]

Type a password — see entropy in bits, what character classes it uses, and how long it would take to brute-force at typical attack rates. Nothing leaves your browser.


STDIN ─────────────────────────────────────────// input
Try this: "password" → 32 bits, instant. "TrustNoOne!2024" → 71 bits, ~50 years offline. "correct horse battery staple" → 100+ bits.

[01]What is entropy?

Entropy is a measure of unpredictability in bits. A password with N bits of entropy has 2N equally likely possibilities. Each additional bit doubles the search space.

NIST SP 800-63B recommends a minimum of 8 characters but explicitly says length beats complexity — "correct horse battery staple" (4 random words) has more entropy than "Tr0ub4dor&3" while being easier to remember. xkcd #936 is right.

[02]How this calculator estimates entropy

This is a coarse, character-class-based estimate. The character pool is determined by which classes the password uses (lowercase=26, uppercase=26, digits=10, symbols=33). Entropy = log2(poollength).

This overestimates for passwords with patterns (repeated chars, dictionary words, dates). Real entropy of "Password1!" is much lower than its 65-bit class-based estimate because most attackers try dictionary patterns first. For an attacker-realistic estimate, use zxcvbn; this tool's job is to give you a fast directional read.

[03]The four crack-rate scenarios

[04]Privacy

The password never leaves your browser. No analytics on the input, no remote service. Safe to test real passwords.

STDOUT ---------------------------------// output