Common questions from users about how password strength is calculated, what patterns reduce security, and how to create a genuinely strong password
How does this password strength checker calculate strength?
Password strength is calculated using a combination of entropy estimation and pattern detection. Entropy is computed as the password length multiplied by the log base 2 of the character set size -- this gives the theoretical number of bits of randomness in the password. The tool then applies a set of pattern checks that can reduce the effective score regardless of raw entropy: whether the password appears in the top 50 most commonly breached passwords, whether it contains three or more repeating characters, whether it contains sequential character runs like abc or 123, whether it contains keyboard walk patterns like qwerty or asdf, and whether it is a leet-speak substitution of a common word like p@ssw0rd. The final score from Very Weak to Very Strong reflects both the raw entropy and the penalty for detectable patterns.
Is my password sent to a server when I use this tool?
No -- all password analysis runs entirely in your browser using JavaScript. Your password never leaves your device at any point during the analysis. There is no server-side component, no API call, no network request, and no logging of any kind. The entire analysis pipeline -- entropy calculation, pattern detection, crack time estimation, and suggestion generation -- executes locally in your browser's JavaScript engine. You can verify this by opening your browser's network inspector (F12 → Network tab) while typing a password -- you will see zero outgoing requests containing any password data.
What is password entropy and why does it matter for security?
Password entropy is a mathematical measure of how unpredictable a password is, expressed in bits. The formula is: entropy = length x log2(charset_size). Each additional bit of entropy doubles the number of possible passwords an attacker must try to find yours through brute force. At 40 bits of entropy, there are about 1 trillion possible passwords -- a modern GPU cluster could crack this in hours. At 80 bits, the search space is over 1 quadrillion quadrillion -- computationally infeasible with any current technology. At 128 bits, the number of possible passwords exceeds estimates of atoms in the observable universe. The tool displays your password's current entropy in bits so you can see exactly where it sits on this scale.
Why does a long password beat a short complex one in terms of strength?
Because entropy grows multiplicatively with length but only additively with character set size. Each additional character multiplies the search space by the entire charset size -- for a mixed-character password with 95 possible characters, adding one more character makes the password 95 times harder to brute force. Adding a new character type (for example, adding symbols to a letters-only password) only increases the charset from 52 to 84 -- a factor of 1.6x. This means a 20-character lowercase-only password has approximately 94 bits of entropy, while a 10-character fully mixed password has approximately 65 bits -- the longer password is 2^29 times harder to crack despite using fewer character types.
What is a keyboard walk pattern and why is it dangerous?
A keyboard walk is a sequence of keys that are physically adjacent on a keyboard layout -- examples include qwerty, asdfgh, zxcvbn, 1234567890, and qazwsx. These patterns feel memorable to users because they follow a physical hand movement, but they are among the very first patterns that automated password cracking tools try in dictionary attacks. Major wordlists used in password cracking include thousands of keyboard walk variants of various lengths, starting points, and directions. A password that is long and seemingly complex but contains a keyboard walk in its core -- like MyqwertyPass1 -- is significantly weaker than its entropy estimate suggests because attackers explicitly try these patterns.
What does it mean when the tool says my password is in a breach database?
The tool maintains a local list of the 50 most commonly breached passwords and their common leet-speak substitutions (replacing letters with visually similar numbers or symbols, like p@ssw0rd for password). If your password or a leet-speak variant matches one of these extremely common passwords, the tool flags it as commonly breached. This means the password almost certainly appears in the massive breach datasets used by attackers in credential stuffing attacks, and any account using it should be considered effectively unprotected. For a comprehensive check against 800 million real leaked passwords, use the Password Breach Checker tool which queries the Have I Been Pwned database using k-anonymity.
How long should a password be to be considered strong?
The minimum acceptable length for any account is 12 characters, and 16 characters is the broadly recommended standard for accounts you care about. For high-value accounts -- email, banking, cloud storage, and workplace systems -- use 20 or more characters. For your password manager master password, which protects all your other credentials, use a 24+ character random string or a 6-word Diceware passphrase. Length requirements published by NIST (SP 800-63B) now focus primarily on length (minimum 8, recommended 15+) rather than complexity rules, reflecting research showing that length is a far more effective security property than forcing users to mix character types in short passwords.
Does adding symbols and uppercase letters really make a password stronger?
Yes, but less than most people assume, and only when combined with adequate length. Adding symbols to a password expands the possible character set from 62 characters (26 upper + 26 lower + 10 digits) to approximately 94 characters -- this increases the search space by a factor of about 1.5x per character. By contrast, adding a single character to a 94-character charset password multiplies the search space by 94x. For a 16-character password, using all four character types adds roughly 13 bits of entropy compared to lowercase-only -- meaningful but far less impactful than increasing length from 12 to 16 characters. Character type diversity matters most for shorter passwords where it can be the difference between being cracked in hours versus years.
What is leet speak and why does it not make a password stronger?
Leet speak (or l33t speak) is the practice of replacing letters with visually similar numbers or symbols -- substituting 3 for e, 0 for o, 1 for l, 4 for a, @ for a, and 5 for s. Passwords like p@ssw0rd, l3tm3in, and @dmin are leet-speak substitutions of extremely common passwords. Attackers have been aware of this pattern for decades and every major password cracking tool -- including Hashcat and John the Ripper -- includes rule sets that automatically generate leet-speak variants of every word in their dictionaries. Using leet speak on a common word provides no meaningful security improvement because the pattern is completely predictable and systematically enumerated by attack tools.
How is the crack time estimate calculated?
The crack time estimate is based on the number of bits of entropy in the password and assumes an offline brute-force attack at approximately 10 billion guesses per second -- a realistic throughput for a modern GPU cluster attacking a fast unsalted hash like MD5 or SHA-1. This is a conservative scenario representing a reasonably well-resourced attacker. For passwords protected by modern slow hash functions like bcrypt, scrypt, or Argon2 with high cost factors, crack times would be orders of magnitude longer. Conversely, for passwords protected by weak storage (cleartext or fast hashes), the actual crack time could be significantly shorter. The estimate is a useful order-of-magnitude guide to the relative security of different password configurations rather than a precise prediction.