Inputs

Stays in your browser — never sent anywhere. Or skip and use length+charset.
0 = use the password above.

Entropy is the only number that matters

"Use a strong password" is bad advice. The actually-useful question is: how many bits of entropy? Entropy is the log2 of the search space — basically, how many guesses an attacker needs on average. More bits = exponentially harder to crack.

BitsSearch spaceTime at 10 GH/sVerdict
40~1 trillion~2 minutesTrivially cracked
60~1 quintillion~3.6 yearsWeak — phishing-target only
80~10²⁴~3.8 million yearsReasonable for most uses
100~10³⁰~4 trillion yearsSolid for high-value accounts
128+Heat death of universeCryptographic-grade

Two strategies that actually work

Diceware passphrases — 5+ random dictionary words separated by spaces. Each word from a list of ~7,776 contributes about 12.9 bits. Six words ≈ 77 bits, easy to memorize.

Random character strings — minimum 14 chars from full ASCII (a-z, A-Z, 0-9, symbols). 14 chars × log2(95) ≈ 92 bits. Use a password manager — you won't memorize it.

Important caveat

This calculator estimates entropy for random passwords. If your password is "P@ssw0rd!" or your kid's birthday or a common phrase, the real entropy is far lower — attackers use dictionaries and rule-based attacks first, not raw brute force. The entropy figure is an upper bound.