Every password meter you've seen talks about "strength" in vague words like weak, okay, and strong. The honest unit is entropy, measured in bits. It's a precise, logarithmic way of saying "how much work would an attacker need to guess this?" — and each bit doubles that work.
The formula, in one line
Password entropy is log₂(alphabet_size ^ length). In plain English: raise the number of possible characters to the length of the password, then take the base-2 logarithm. The result is a number of bits.
A few concrete examples:
- 8 lowercase letters — log₂(26⁸) ≈ 37.6 bits. Crackable on a GPU in seconds.
- 12 mixed-case alphanumeric — log₂(62¹²) ≈ 71.5 bits. Takes modern hardware hours to days.
- 16 chars with symbols — log₂(95¹⁶) ≈ 105.1 bits. Essentially uncrackable by brute force.
- 20 chars with symbols — log₂(95²⁰) ≈ 131.4 bits. Beyond cryptographic overkill.
Why each bit doubles the work
Logarithms are the reason. Adding 1 bit means doubling the number of possibilities an attacker has to try. Going from 50 to 60 bits isn't 20% more security — it's 1,024× more (2¹⁰). Going from 60 to 128 is 2⁶⁸ times more, which is a number with 20 zeros.
This is why small-looking changes to a password produce huge gains. One more character from a 95-symbol set adds ~6.6 bits. That means one more character makes the password ~100× harder to brute-force. Attackers don't run out of patience for 10% more work; they run out of patience for 100× more work.
Crypto-quality random, configurable length and character classes, entropy shown in bits. Runs in your browser.
What "weak" and "strong" actually mean
The strength thresholds below assume modern hardware (GPU arrays doing billions of hash attempts per second) and that the attacker has either the leaked hash or an unrestricted online attack surface:
- Under 60 bits — weak. Crackable in minutes to days on consumer GPUs. Don't use for anything real.
- 60–79 bits — okay. Takes motivated attackers weeks to months. Fine for low-value accounts if paired with rate limiting and 2FA.
- 80–127 bits — strong. Effectively uncrackable by any realistic attacker. Good for most accounts.
- 128+ bits — excellent. Cryptographic-level strength. Reserve for password manager master passwords and encryption keys.
The length vs complexity trade
If you have to choose one, choose length. An added character from a 95-symbol set adds ~6.6 bits. Switching from lowercase (26) to mixed-case+digits+symbols (95) at the same length is a one-time boost — but you only get it once, whereas length keeps paying.
The "correct horse battery staple" approach is mathematically sound: 4 random words from a 7,776-word dictionary is ~51 bits. Push it to 5 words and you're at ~65. Six words gets you ~78 bits — stronger than most "secure" passwords, and dramatically easier to remember.
Entropy isn't everything
One big caveat: entropy assumes random choice from the full alphabet. A password you chose yourself — even if it uses 95 possible characters and is 16 long — usually has far less entropy than the theoretical maximum because humans aren't random. We pick familiar patterns, common substitutions (a → @, e → 3), and dictionary words with predictable modifications.
Real-world entropy for a human-chosen password is often 20–30 bits below the theoretical maximum. That's why tools like zxcvbn exist — they try to model human patterns and give a more honest strength estimate. Random generators like this one sidestep the problem entirely: if the generator is cryptographically random, the entropy is exactly what the math says.
Truly random, entropy computed live, nothing leaves your browser. The math is honest.

