Password Combination Calculator
Password combination calculator. Compute total combinations, entropy bits, brute-force time. NIST, O
Why This Statistical Analysis Matters
Why: Statistical calculator for analysis.
How: Enter inputs and compute results.
Total Password Combinations & Brute-Force Time
Combinations = charset^length. Entropy = length × log₂(charset). NIST recommends length over complexity. Use a password manager.
Real-World Scenarios — Click to Load
Inputs
Time to Crack by Length
Strength (Entropy) by Length
Charset Impact (8 chars)
Calculation Breakdown
For educational and informational purposes only. Verify with a qualified professional.
Key Takeaways
- • Total combinations = charset^length — each character multiplies possibilities
- • Entropy (bits) = length × log₂(charset) — measures unpredictability
- • Length beats complexity — NIST recommends longer passphrases over complex short passwords
- • Online attacks (~1K/s) are rate-limited; offline attacks (MD5 ~100B/s) can try billions per second
- • Use a password manager to generate and store unique, strong passwords for every account
Did You Know?
Expert Tips
Length over complexity
"Password1!" is weaker than "correct horse battery staple" — NIST agrees
Use a password manager
Generate unique 16+ char passwords per site; you only remember one master password
Enable 2FA
Two-factor authentication adds a second layer even if password is compromised
Check Have I Been Pwned
If your password appears in a breach, change it immediately
Character Sets Comparison
| Charset | Size | 8 chars | 12 chars |
|---|---|---|---|
| Lowercase only | 26 | 208B | 95 quadrillion |
| + Uppercase | 52 | 53T | 390 quadrillion |
| + Digits | 62 | 218T | 3.2 sextillion |
| + Special (95) | 95 | 6.6 quadrillion | 540 quadrillion |
Frequently Asked Questions
Why does NIST recommend length over complexity?
Longer passwords create exponentially more combinations. A 16-char lowercase password (26^16) has more combinations than an 8-char full-set password (95^8). Length scales better and is easier to remember as passphrases.
What is a good entropy for passwords?
NIST recommends at least 80 bits for high-security. 128 bits is cryptographically strong. Most sites: 40+ bits is reasonable. Weak: <28 bits (easily cracked).
How fast can attackers try passwords?
Online (rate-limited): ~1,000/sec. Offline MD5: ~100 billion/sec with GPUs. Offline bcrypt: ~50,000/sec (intentionally slow). Always assume worst-case if database is leaked.
Should I use a password manager?
Yes. Password managers generate strong, unique passwords per site. You remember one master password. OWASP and CISA recommend them.
What about passphrases?
Passphrases like "correct-horse-battery-staple" are memorable and can be strong. 4 random words from a 7,776-word list ≈ 51 bits. Add a number/symbol for more.
Why is my 8-char password weak?
8 chars with 95 options = 95^8 ≈ 6.6 quadrillion. At 100B/s that is ~66,000 seconds ≈ 18 hours. Attackers use dictionaries and rules — real crack time is often faster.
By the Numbers
Official Data Sources
Disclaimer: This calculator provides theoretical brute-force estimates. Real-world attacks use dictionaries, rules, and leaked databases — actual crack times may be shorter. Use a password manager, enable 2FA, and follow NIST/OWASP guidelines. Check Have I Been Pwned if you suspect a breach.
Related Calculators
Accuracy Calculator
Compute classification metrics from a confusion matrix: Accuracy, Precision, Recall, F1 Score, Specificity, MCC, and more. Essential for ML model evaluation.
StatisticsBayes' Theorem Calculator
Calculate posterior probabilities using Bayes' theorem. Input prior, likelihood, and evidence to update beliefs with step-by-step Bayesian reasoning.
StatisticsBertrand's Box Paradox
Interactive Bertrand's Box Paradox simulator. Explore why the probability of the other coin being gold is 2/3, not 1/2, with Monte Carlo simulation and Bayesian proof.
StatisticsBertrand's Paradox
Explore Bertrand's Paradox — three valid methods for choosing a random chord give three different probabilities (1/3, 1/2, 1/4). Interactive simulation and visualization.
StatisticsBirthday Paradox Calculator
Calculate the probability that at least two people in a group share the same birthday. Interactive chart showing probability vs group size.
StatisticsBoy or Girl Paradox
Interactive Boy or Girl Paradox (Two-Child Problem). Explore why 'the older child is a boy' gives P=1/2 while 'at least one is a boy' gives P=1/3. With Monte Carlo simulation.
Statistics