Back to Blog
Tutorials

Password Entropy Explained — And Why Your "Complex" Password Is Weaker Than a Passphrase

Entropy is the only honest measure of password strength. Here is how it is calculated, how long attackers need to break different levels, and why four random words often beat a 12-character "P@ssw0rd!".

AdminApril 23, 20264 min read31

"Make your password complex" is useless advice. It tells you to add a symbol and a number as if that made the password secure. It does not. The only honest measure of password strength is entropy, and most "complex" passwords score worse on it than you think.

What Entropy Actually Measures

Entropy is the number of bits of randomness in your password — in other words, how many guesses an attacker needs, on average, to crack it by brute force. It is computed as length × log₂(pool size).

Example: a 10-character password using only lowercase letters (pool = 26) has entropy 10 × log₂(26) ≈ 47 bits. A 10-character password using lowercase, uppercase, numbers, and symbols (pool = 88) has 10 × log₂(88) ≈ 64.6 bits. The same length, but the larger pool makes each character work harder.

How Many Bits Is "Safe"?

Rough modern thresholds (assuming a well-hashed password that survives a database leak — if the site uses bcrypt or argon2, which it should):

  • Under 40 bits: crackable in minutes by a single GPU.
  • 40–60 bits: crackable in hours to weeks by a serious attacker with a GPU farm.
  • 60–80 bits: safe against today's offline brute force. Good target for individual accounts.
  • 80–100 bits: resistant to any current adversary, nation-states included, for the lifetime of current hardware.
  • 100+ bits: overkill for any realistic threat model.

Aim for 80 bits on anything that protects money, identity, or infrastructure. Aim for 100+ on your password manager's master password.

The "Complex" Password Trap

Users asked to create a "complex" password pick predictable patterns: capitalize the first letter, add a number at the end, swap a for @. Password1! is 10 characters and looks complex to a human. To a cracker, it is one guess — it appears in every leaked-password dictionary.

The real entropy of user-chosen passwords is dramatically lower than their pool size suggests, because humans are not good at being random. Studies consistently put it around 20–30 bits regardless of the claimed complexity.

Why Passphrases Win

A passphrase is 4–7 random words joined with dashes: garden-river-pencil-strong-sunset-bridge. Six random words from a 512-word list have 6 × log₂(512) = 54 bits of entropy — more than most people achieve with their "complex" password, and dramatically more memorable.

Scale to seven words and you cross 63 bits. Eight words from a 7776-word list (Diceware) gives 103 bits. All while being easy to type, easy to remember, and immune to most dictionary attacks (because the combination is random even if each word is common).

Pronounceable Passwords: The Middle Ground

For scenarios where a password has to be dictated over the phone, pronounceable passwords alternate consonants and vowels: baketomiloguno. Each syllable (consonant + vowel) has log₂(21 × 5) ≈ 6.7 bits of entropy, so six syllables gives ~40 bits.

Weaker than passphrases but stronger than typical human-chosen passwords, and critically easier to read aloud without asking "was that an O or a zero?".

Generating Safe Passwords

Do not rely on human randomness. Use a tool. The aukimi Password Generator offers three modes — random, passphrase, and pronounceable — with a live entropy meter so you can see exactly how strong your output is. It uses crypto.getRandomValues (the browser's cryptographically secure random source) and applies rejection sampling to eliminate modulo bias.

Critically: generation happens entirely in your browser. Nothing is transmitted, logged, or stored. Open your devtools network tab while generating — you will see zero requests leave the page.

The One Rule

Use a password manager. Generate a long random password for every site (your password manager never forgets it, so length does not matter for usability). Use a passphrase as your password manager's master password — that is the one you have to remember.

Everything else is optimization. Get this one pattern right and you are ahead of 95% of users.

#password#security#entropy#passphrase

Enjoyed this article?

ShareHN