Password Strength Checker
Basics

What Is Password Strength? How It's Measured and How to Improve Yours

Password strength measures how hard your password is to crack. Learn how entropy, length, and character sets determine it — and how to make yours stronger today.

By PasswordStrength.io8 min read
What Is Password Strength? How It's Measured and How to Improve Yours
Table of Contents

Your password is the first lock on your digital life. But not all locks are equal — a padlock on a screen door offers very different protection than a deadbolt on a steel door. Password strength is the measure of how hard your particular lock is to break. Understanding what password strength actually means, how tools measure it, and what you can do to improve it is one of the most practical security skills you can develop.

This guide covers everything: the science behind strength measurement, what separates weak passwords from strong ones, common myths that persist despite being debunked, and a clear action plan for improving every password you own.

What Password Strength Actually Means

Password strength is not a score out of 100. It is a practical measure of how resistant a password is to being guessed or cracked by an attacker.

The key question is: how many attempts would an attacker need to try before finding your password? A weak password might fall in under a second. A strong one could take longer than the current age of the universe.

Strength is not about following arbitrary rules ("must contain a capital letter and a symbol"). It is about the size of the problem you force on anyone trying to break in. Think of it like a combination lock: a 3-digit lock has 1,000 combinations, while a 6-digit lock has 1,000,000. Each extra digit multiplies the difficulty. Passwords work the same way.

How Password Strength Is Measured

Password strength is formally measured using entropy, expressed in bits. Entropy represents the number of possible combinations your password could be, on a logarithmic scale.

The Entropy Formula

Entropy (in bits) = Length × log₂(Character Set Size)

Here is what that looks like for common character sets:

Character set usedCharacters availableBits per character
Lowercase only (a–z)264.7 bits
Lowercase + uppercase525.7 bits
Lowercase + uppercase + digits625.95 bits
All printable ASCII (+ symbols)946.55 bits

So an 8-character password using only lowercase letters has roughly 37.6 bits of entropy (8 × 4.7). An 8-character password using all printable ASCII has about 52.4 bits. And a 16-character password using all printable ASCII has around 104.8 bits — nearly three times more entropy than the 8-character version, not just twice.

What Entropy Levels Mean in Practice

EntropyStrengthReal-world context
Under 28 bitsVery weakCrackable in milliseconds
28–35 bitsWeakCrackable in minutes to hours
36–59 bitsModerateCrackable in days to months on fast hardware
60–80 bitsStrongCrackable in years with significant resources
80+ bitsVery strongEffectively uncrackable with current technology

What Password Strength Meters Check

A good password strength meter — like the free analyzer at PasswordStrength.io — does more than calculate raw entropy. It also checks:

  • Pattern detection: Does your password contain keyboard walks (qwerty, 12345), dates, or repeated sequences?
  • Dictionary attacks: Is your password a common word or phrase that appears in attack wordlists?
  • Breach database matching: Does your password match known breached credentials from data dumps?
  • Crack time estimates: How long would it take to crack using brute force, dictionary attacks, or hybrid methods?

Raw entropy is the theoretical maximum. Actual strength is lower if your password follows a predictable pattern, even at high character counts.

What Makes a Password Weak vs. Strong

Not all passwords are created equal. Here is a direct comparison of weak and strong password patterns — without using real examples that could end up in wordlists.

Characteristics of a Weak Password

  • Short length: 8 characters or fewer puts you in crackable territory for most attack types
  • Single character type: All lowercase, or all digits, shrinks the character set dramatically
  • Predictable patterns: Starting with a capital letter and ending with a number and symbol is so common it is modelled by every serious cracking tool
  • Dictionary words: Any single word from any language, even obscure ones, falls quickly to dictionary attacks
  • Personal information: Names, birthdays, pet names, and addresses are tried early in targeted attacks
  • Common substitutions: Replacing "a" with "@" or "e" with "3" provides almost no extra protection — crackers model these substitutions by default

Characteristics of a Strong Password

  • 16+ characters: Length is the single most effective lever you have
  • Mixed character types: Combining uppercase, lowercase, digits, and symbols expands the search space significantly
  • Randomness: No recognisable words, no predictable structure
  • Uniqueness: Never reused across sites — if one site is breached, others stay safe
  • Not on any list: Not in the top 10 million most common passwords, and not in known breach databases

In concrete terms: an 8-character password using all character types has roughly 52 bits of entropy. A 16-character password using all character types has roughly 105 bits. The 16-character version is not twice as strong — it is astronomically stronger, because the number of combinations grows exponentially.

How to Check Your Password Strength

The fastest way to know where you stand is to use a password strength tester. The free tool at PasswordStrength.io performs a full client-side analysis including:

  • Entropy calculation in bits
  • Character composition breakdown
  • Crack time estimates across multiple attack scenarios
  • Pattern and weakness detection
  • Actionable suggestions for improvement

Because everything runs in your browser, your password is never sent to any server. You can safely test your real passwords without any exposure risk.

When reading your results, pay attention to crack time under "offline fast hashing" — this represents a scenario where an attacker has obtained a hashed copy of your password and is running GPU-accelerated cracking. It is the most realistic threat model for most breaches.

For deeper context on how attackers actually approach cracking, the post on how hackers crack passwords explains brute force, dictionary, and hybrid attack methods in plain English.

How to Improve Your Password Strength

Improving password strength does not require memorising strings of random characters. Here are the most effective strategies, in order of impact.

1. Make It Longer

This is the highest-impact change you can make. Going from 10 to 16 characters adds far more entropy than adding symbols to a short password. Aim for 16 characters as your minimum for important accounts, and 20+ for email and financial accounts.

2. Use a Passphrase

A passphrase is four or more unrelated random words strung together — for example, a structure like [colour][animal][verb][object] but with words chosen randomly, not by you. At 4–5 words, a passphrase typically reaches 50–70+ bits of entropy and is far easier to remember than a random character string.

3. Add Randomness, Not Patterns

If you are building a character-based password, use a password generator rather than your own creativity. Humans are poor random number generators — we unconsciously apply patterns that crackers are trained to exploit. A password manager's built-in generator produces genuinely random output.

4. Use a Password Manager

A password manager solves the core problem: you cannot memorise 50 unique, 20-character random passwords, but a manager can. You remember one strong master password; the manager handles the rest. This is the single change that most improves your overall security posture. The complete guide to password managers covers how to choose and set one up.

5. Enable Two-Factor Authentication

Even a strong password can be compromised in a phishing attack or data breach. Two-factor authentication (2FA) adds a second layer that stops an attacker who has your password but not your device. For a full explanation, see Two-Factor Authentication Explained.

6. Check for Breaches

Run your email address through a breach-checking service periodically. If an account's credentials appear in a known breach, change that password immediately — even if it was strong, it is now compromised data.

Common Misconceptions About Password Strength

Several widely held beliefs about passwords were outdated years ago. In 2026 they persist mainly because old IT policies have been slow to catch up.

Myth: Mandatory Complexity Rules Make Passwords Stronger

Forcing users to include uppercase, lowercase, digits, and symbols often backfires. Users satisfy the rule in the most predictable way possible: Password1!. This follows the rule exactly and is one of the most commonly cracked passwords in existence.

NIST's current guidelines (SP 800-63B, 2026 revision) explicitly state that organisations "shall not" impose arbitrary composition rules. The evidence shows they reduce security by pushing users toward predictable patterns.

Myth: Periodic Password Resets Improve Security

Mandatory 90-day resets cause users to make minimal changes — Password1! becomes Password2! — which provides essentially no security benefit while creating usability friction. NIST's guidance now recommends against mandatory periodic resets unless there is specific evidence of compromise.

Myth: A Strong-Looking Password Is a Strong Password

Tr0ub4dor&3 looks complex. But it became famous as an example in a widely circulated security comic, and it is now in attack wordlists. Strength is not about appearances — it is about unpredictability and not being in any list an attacker is likely to use.

Myth: Longer Is Always Better Regardless of Pattern

Length matters enormously when combined with randomness. A 20-character password built from a predictable pattern (like repeating a word or using a keyboard walk) can still be weak. Length and randomness work together.

For a broader look at how password thinking has evolved, the post on the evolution of password security provides useful historical context.

Password Strength and NIST 2026 Standards

The current NIST standard — Special Publication 800-63B — reflects a significant shift in thinking about what makes passwords effective. The key positions for 2026 are:

  • Minimum 15 characters for single-factor authentication (up from 8 in earlier guidance)
  • Allow up to 64 characters — systems should support long passphrases
  • No mandatory complexity rules — composition requirements are counterproductive
  • No mandatory expiration — only reset passwords on evidence of compromise
  • Compromised credential screening — check new passwords against known breach databases
  • Support all printable ASCII and Unicode — do not restrict character types

The NIST password guidelines explained post covers these updates in detail, including what they mean for businesses and individual users.

The bottom line from NIST: a long, random, unique password that is not in a breach database is more valuable than a short, complex password that follows a predictable pattern.

What to do next

The most useful thing you can do right now is test your most important passwords. Use the free password strength tester at PasswordStrength.io to get an entropy score, crack time estimates, and specific improvement suggestions — all without your password leaving your browser. Start with your email account password, since that is the master key to most of your other accounts. If the tool flags it as weak or moderate, a password manager can generate and store a replacement in under a minute.

Frequently Asked Questions

What is password strength?
Password strength is a measure of how resistant a password is to guessing and brute-force attacks. It depends on three factors: length, character variety, and unpredictability. A strong password takes an attacker millions of years to crack with current hardware, while a weak one falls in seconds.
How is password strength measured?
Password strength is measured using entropy — a value in bits that represents how many possible combinations exist. The formula is: entropy = length × log₂(character set size). A password with 70+ bits of entropy is considered strong. Tools like password strength meters calculate this instantly and also check for known patterns and breached passwords.
How long should a password be in 2026?
According to NIST Special Publication 800-63B (2026 update), passwords used for single-factor authentication should be at least 15 characters. For most accounts, aim for 16–20 characters. A long passphrase — four or more random words — is both strong and memorable, and typically outperforms a short complex password.
Is a complex password better than a long one?
Length beats complexity almost every time. Adding one character to a password multiplies the number of combinations an attacker must try. Adding a symbol only increases the character set from 62 to 94, a much smaller gain. NIST's 2026 guidelines explicitly dropped mandatory complexity rules in favour of encouraging longer passwords and passphrases.
How can I check my password strength?
Use a client-side password strength tester like the free tool at passwordstrength.io. It calculates entropy, detects weak patterns, estimates crack times across attack types, and gives actionable improvement tips — all without sending your password to any server.