alltools.one
Securityβ€’
2025-06-29
β€’
7 min
β€’
alltools.one Team
PasswordEntropySecurityCryptographyAuthentication

Password Entropy Explained: What Makes a Password Strong

When a website tells you your password is "weak" or "strong," it is measuring entropy β€” the mathematical randomness of your password. Understanding entropy helps you create passwords that are genuinely secure rather than just hard to type.

What Is Entropy?

Entropy, measured in bits, quantifies how unpredictable a password is. Each bit of entropy doubles the number of possible passwords an attacker must try. The formula is:

Entropy = logβ‚‚(C^L)

Where:

  • C = size of the character set
  • L = length of the password

Alternatively: Entropy = L Γ— logβ‚‚(C)

Entropy by Character Set

Character SetPool Size (C)Bits per Character
Digits only (0-9)103.32
Lowercase letters (a-z)264.70
Lowercase + digits365.17
Mixed case (a-z, A-Z)525.70
Mixed case + digits625.95
All printable ASCII956.57

Example calculations:

  • password (8 lowercase): 8 Γ— 4.70 = 37.6 bits β€” crackable in seconds
  • P@ssw0rd (8 mixed): 8 Γ— 6.57 = 52.6 bits β€” crackable in hours
  • correct-horse-battery-staple (28 lowercase + symbols): far higher effective entropy due to length

Length vs. Complexity

Here's the counterintuitive truth: length contributes more to entropy than complexity.

PasswordLengthEntropyTime to Crack (1B guesses/sec)
Xy7!426.3 bits< 1 second
Xy7!Qp2$852.6 bits142 years
mysimplepassword1675.2 bits1.2 billion years
correct horse battery22103 bitsHeat death of universe

A 16-character lowercase password is stronger than an 8-character password with every character type. This is why modern security guidance (NIST SP 800-63B) recommends long passphrases over short complex passwords.

The Problem with "Complexity Rules"

Traditional password policies (must include uppercase, lowercase, number, symbol) are counterproductive:

  1. Predictable patterns: Users capitalize the first letter, add 1! at the end β†’ Password1!
  2. Reduced memorability: Complex passwords get written on sticky notes
  3. False security: An 8-character "complex" password has less entropy than a 16-character simple one

Modern guidance from NIST:

  • Minimum 8 characters, recommended 15+
  • No composition rules (uppercase, symbols, etc.)
  • Check against breached password databases
  • Allow all printable characters including spaces
  • No forced periodic rotation

Passphrase Strategy

Passphrases use random words instead of random characters:

method: pick 4-6 random words from a dictionary
example: "timber quantum spoon velocity"
entropy: 4 words Γ— ~12.9 bits/word (from 7,776-word list) β‰ˆ 51.7 bits
better:  6 words β‰ˆ 77.5 bits

The Diceware method uses a list of 7,776 words (6^5, matching five dice rolls). Each word adds 12.9 bits of entropy.

Advantages:

  • Memorable (you can visualize the words)
  • Long (naturally 20-35 characters)
  • High entropy with enough words
  • Easy to type

Generate secure random passwords and passphrases with our Password Generator.

Real Attack Speeds

Entropy only matters relative to attack speed:

Attack TypeSpeed40-bit Password60-bit Password80-bit Password
Online (rate-limited)1,000/sec12.7 days36,559 years38M years
Offline (CPU)1B/sec1.1 seconds36.5 years38,334 years
Offline (GPU cluster)1T/sec< 1 second13 days38 years
Nation-state1P/sec< 1 second< 1 second14 days

For online accounts with rate limiting and lockout, 40+ bits is adequate. For offline attacks (stolen password hashes), 80+ bits is the minimum. This is why password hashing algorithms like Argon2 and bcrypt exist β€” they make each guess expensive.

Password Manager Math

A password manager changes the equation entirely:

  • One strong master password: 80+ bits entropy (6+ word passphrase)
  • Every other password: Generated randomly, 128+ bits, unique per site
  • No reuse: A breach at one site doesn't affect others

The math favoring password managers is overwhelming. A single reused password, no matter how strong, is weaker than unique weak passwords per site, because one breach compromises all accounts.

Measuring Your Password

When evaluating password strength, consider:

  1. Is it in a breach database? β€” Even "strong" passwords are weak if they've been leaked (check haveibeenpwned.com)
  2. Is it random? β€” Human-chosen passwords have far less entropy than random ones
  3. How is it stored? β€” bcrypt with cost factor 12 adds ~22 bits of effective entropy vs. plain MD5

For more on secure password generation, see our comprehensive password generation guide.

FAQ

How many bits of entropy do I need?

For online accounts with rate limiting: 40-50 bits minimum. For passwords protecting encrypted data (disk encryption, password manager master password): 80+ bits. For cryptographic keys: 128+ bits. The right answer depends on what you are protecting and who might attack it.

Does adding a symbol to my password make it significantly stronger?

Adding one symbol increases the character pool from 62 to 95, adding about 0.6 bits per character. For an 8-character password, that is roughly 5 extra bits β€” equivalent to adding one more lowercase character. Length is almost always a better investment than adding character types.

Related Resources

Published on 2025-06-29
Password Entropy Explained: What Makes a Password Strong | alltools.one