Σ CALCULATOR Wizard
Security

Password Generator

Strong, random passwords generated instantly in your browser. Nothing is sent to any server.

Generated Password
Tap to copy  ·  Auto-updates as you adjust settings
Password Strength
Entropy:
Pool size:
Est. crack:
Password Length
20
4 — 128
Character Sets
Uppercase
A B C … Z
Lowercase
a b c … z
Numbers
0 1 2 … 9
Symbols
! @ # $ % &
Extended
[ ] { } | \ ~
Quick Presets
📱 PIN (6-digit) 📶 WPA2 Key 💻 Developer 🛡 Maximum 📖 Passphrase
💬
Passphrase Mode
Memorable words with separator (correct-horse-battery-staple style)
Words
4
Options
No ambiguous
0 O l 1 I
No similar
u v w U V W
At least 1 of each selected type
Bulk generate
🔒 100% Private. All passwords are generated locally using crypto.getRandomValues() — nothing is sent to any server.

How to Create a Strong Password — The Science of Password Security

Password security is fundamentally a math problem. Every password can be measured by two numbers: the size of the character pool it draws from, and its length. Together these determine entropy — the amount of randomness measured in bits. The higher the entropy, the more guesses an attacker must make to crack the password. A password with 80 bits of entropy requires 280 attempts to guarantee a find by brute force — that is approximately 1.2 quintillion guesses. At a rate of one billion guesses per second — which modern GPU-accelerated cracking hardware can achieve — exhausting an 80-bit keyspace would take over 38,000 years.

Password Entropy — The Calculation

Entropy is calculated as: E = L × log₂(N), where L is the password length and N is the size of the character pool. Every additional character type you include expands the pool size, and every additional character in length multiplies the total combinations by the pool size. This is why length is the most powerful lever: adding one character to a 20-character password from a pool of 94 characters multiplies the number of possible combinations by 94. Adding one more character type (say, expanding from 62 to 94) only increases entropy by log₂(94/62) ≈ 0.6 bits per position.

Entropy Benchmarks — How Strong Is Strong Enough?

EntropyExampleEst. Crack Time (GPU)Use Case
< 28 bits4-digit PINInstantLow-value only
28–35 bits6 chars, all typesMinutes–hoursAvoid for accounts
36–59 bits8–10 chars, mixedDays–monthsMinimum for accounts
60–79 bits12–14 chars, mixedCenturies–millenniaGood for most accounts
80–99 bits16–20 chars, all typesMillions of yearsSensitive accounts
100+ bits20+ chars / passphraseHeat death of universeMaximum security

Character Pool Sizes

Character SetPool SizeEntropy/CharNotes
Digits only (0–9)103.32 bitsPINs only
Lowercase letters264.70 bitsWeak alone
Upper + lowercase525.70 bitsBetter, still guessable
Letters + digits625.95 bitsCommon standard
Letters + digits + symbols946.55 bitsStrong standard
Full printable ASCII956.57 bitsMaximum standard pool
4-word passphrase (EFF)7776⁴~51 bits totalMemorable + strong
5-word passphrase (EFF)7776⁵~64 bits totalRecommended minimum
⚡ Key Insight: A randomly generated 12-character password using all character types (pool = 94) has approximately 78 bits of entropy — more than enough to resist all currently known attacks. A randomly generated 20-character password using only uppercase and lowercase letters (pool = 52) has approximately 114 bits of entropy — significantly stronger, despite using fewer character types. Length wins.

Why "Password Complexity" Rules Are Counterproductive

The classic rule set — must contain uppercase, lowercase, number, and symbol, but can be as short as 8 characters — is mathematically backwards. An 8-character password from a pool of 94 characters has only 52.4 bits of entropy, which a modern GPU cluster can crack within months using brute force, and within seconds if it appears in a known dictionary. NIST (the U.S. National Institute of Standards and Technology) reversed its position on complexity requirements in its 2017 guidelines, recommending length over complexity and eliminating arbitrary rotation requirements. An 8-character "complex" password is dramatically weaker than a 16-character passphrase like "correct-horse-battery-staple" — even though the passphrase uses only lowercase letters and hyphens.

How Attackers Actually Crack Passwords

Modern password cracking uses several techniques in order of efficiency. Credential stuffing tries username/password pairs from previous breaches — billions of these are available online. This catches anyone reusing passwords and doesn't require any computing power. Dictionary attacks try common words, names, years, and predictable substitutions (p@ssw0rd, S3cur!ty, etc.). Rules-based attacks use Hashcat or John the Ripper with transformation rules: capitalize the first letter, add a number at the end, replace a with @, etc. These cover most "cleverly modified" passwords. Brute force is the last resort — exhaustively trying every combination — and is only practical for short passwords or weak character pools. A truly random 16+ character password is immune to all of these except brute force, and at that length, brute force is computationally infeasible.

Passphrases vs. Random Passwords — Which Should You Use?

Passphrases are sequences of random words — popularized by the famous XKCD comic featuring "correct horse battery staple" — and they offer a compelling combination of memorability and security. A 4-word passphrase drawn from the EFF's 7,776-word list (using a standard six-sided die roll, hence "diceware") has approximately 51.7 bits of entropy. A 5-word passphrase reaches 64.6 bits. A 6-word passphrase achieves 77.5 bits — approximately equivalent to a randomly generated 12-character password using all character types. Passphrases are primarily useful for the handful of passwords you need to memorize: your computer login password, your primary email account password, and your password manager master password. For everything else, a password manager generating and storing random character strings is preferable.

Password Managers — The Essential Tool

The only correct solution to password management is a password manager. Human-generated passwords are predictable — even when people try to be random, they follow patterns that crack within hours. A password manager solves this by generating truly random passwords of arbitrary length for every account, storing them encrypted behind a single strong master password, and autofilling them on websites. This also eliminates password reuse, which remains the single most common cause of account compromise. Reputable password managers include Bitwarden (open source, free tier), 1Password, Dashlane, and the built-in managers in iOS Keychain and Chrome/Firefox. The threat model for a password manager is vastly better than reusing passwords: an attacker would need to compromise your device, steal your vault file, and crack your master password — versus simply checking a breach database for reused credentials.

Multi-Factor Authentication Changes Everything

Even a weak password becomes dramatically more secure when combined with multi-factor authentication (MFA). With MFA enabled, an attacker who obtains your password still cannot access your account without the second factor — your phone, a hardware key, or a TOTP code. Enable MFA on every account that offers it, prioritizing email, banking, primary social media, and any account linked to payment methods. Use a dedicated authenticator app (Authy, Google Authenticator, Microsoft Authenticator) rather than SMS when possible, as SMS is vulnerable to SIM-swapping attacks. Hardware security keys (YubiKey, Google Titan) offer the strongest MFA and are phishing-resistant. The combination of a long random password and hardware MFA is essentially unbreakable by remote attack.

Frequently Asked Questions

How long should my password be?
For accounts protected only by a password: minimum 16 characters, ideally 20+. For accounts with multi-factor authentication enabled: 12–16 characters is sufficient. For your password manager master password (no MFA fallback possible): use a 6-word passphrase or a 20+ character random string you can memorize. For low-value accounts you'll never access again: 12 characters is fine. The NIST 2017 guidelines set the minimum at 8 characters for human-chosen passwords, but also require that systems accept passwords up to 64 characters — meaning you should take advantage of that ceiling.
Is it safe to use an online password generator?
This generator runs entirely in your browser using the crypto.getRandomValues() API — a cryptographically secure random number generator built into every modern browser. Nothing is transmitted to a server. You can verify this by disconnecting from the internet and continuing to use the generator — it works identically offline. Be cautious of any online password generator that requires an internet connection to generate passwords or that doesn't clearly explain where randomness comes from. All reputable generators use the browser's CSPRNG or a server-side equivalent.
What makes a password truly random?
True randomness for cryptographic purposes means each character is selected independently with equal probability from the full character pool, with no influence from prior selections. This is called a Cryptographically Secure Pseudo-Random Number Generator (CSPRNG). The crypto.getRandomValues() browser API uses the operating system's entropy sources (hardware events, timing jitter, etc.) seeded into a CSPRNG. Human-generated passwords are never truly random — cognitive biases consistently produce predictable patterns. Studies of human "random" sequences show preferences for certain letter combinations, avoidance of repeated characters, and predictable capitalization and number placement. Even people trying hard to be random produce passwords that crack significantly faster than computer-generated equivalents.
Should I use the same password for multiple sites?
Never. Password reuse is the most dangerous password practice because it means a single breach — of any one of the sites where you use that password — exposes every account where you reused it. Credential stuffing attacks, which automatically test breach passwords across thousands of sites, are now fully automated and run continuously. The website Have I Been Pwned (haveibeenpwned.com) catalogs over 12 billion breached credentials as of 2024. The only sustainable solution is a unique, randomly generated password for every account, stored in a password manager. This is not a burdensome as it sounds — password managers autofill credentials, meaning you rarely need to actually type or remember account passwords.
What are the most common passwords attackers try first?
Attackers always begin with the most common passwords before attempting brute force. The perennial top passwords from breach analyses include: 123456, password, 123456789, qwerty, abc123, password1, 111111, and iloveyou. Predictable patterns that appear in nearly every breach list include: year of birth (1990, 1985, etc.), name + year (john1990), keyboard walks (qwerty, asdfgh), sports teams, and common words with leet substitutions (p@ssw0rd). Password cracking tools include these patterns in rule sets that run before brute force. A truly random password is immune to all of these. If your current passwords match any of these patterns, changing them should be your immediate priority.
What is the "no ambiguous characters" option?
The ambiguous characters option excludes characters that look visually similar in many fonts: the number zero (0) and letter O, the number one (1) and letters l (lowercase L) and I (uppercase i). This is important when you need to communicate a password verbally or write it down — being unable to distinguish 0 from O can make a password impossible to enter. When storing passwords in a password manager, ambiguous characters pose no practical problem since you're copying and pasting. But for passwords you might need to share or read aloud — Wi-Fi keys, for instance — excluding ambiguous characters prevents transcription errors.