Blog
Wild & Free Tools

How Password Strength Checkers Work — Entropy, Crack Time, and the Scoring Algorithm

Last updated: March 2026 7 min read
Quick Answer

Table of Contents

  1. What Is Password Entropy?
  2. How Crack Time Is Calculated
  3. Pattern Detection and Entropy Penalties
  4. What the Score Does Not Measure
  5. How Our Checker Scores Your Password
  6. Frequently Asked Questions

Type a password into any strength checker and you get a score — Very Weak, Fair, Strong, Very Strong. But what is the algorithm actually measuring? The answer involves entropy, character sets, pattern penalties, and a specific attack model. Understanding the math helps you make better passwords, not just better-scoring ones.

What Is Password Entropy and Why Does It Matter?

Entropy is the foundation of every password strength calculation. It measures the number of possible combinations for a password of a given length using a given character set.

The formula is: Entropy (bits) = log2(character set size ^ password length)

In practice:

A 12-character password using all character types: log2(95^12) = approximately 78.9 bits of entropy. That represents about 400 quadrillion possible combinations — which is why length and character variety are the two most important factors in any strength score.

How Crack Time Estimates Are Calculated

Crack time translates entropy into something intuitive: how long would it take an attacker to guess this password by brute force?

Most checkers assume a high-end GPU cracking rig attempting approximately 10 billion guesses per second. This is realistic for offline attacks — when an attacker has stolen a password hash database and is cracking it locally with dedicated hardware.

At 10 billion guesses per second:

The crack time displayed by our checker uses this 10B/sec model. For online attacks (guessing through a login form), the number would be far longer because servers rate-limit attempts. The displayed time represents the worst-case scenario — an offline attack on a stolen hash.

Sell Custom Apparel — We Handle Printing & Free Shipping

Pattern Detection: When Length Is Not Enough

Raw entropy assumes every character is chosen randomly. Real passwords rarely are. Strength checkers apply penalties when they detect patterns that reduce effective entropy:

A 10-character password made entirely of "1234512345" is mathematically longer than "Hi!8" but scores much lower because the repeating pattern reduces the effective character space to near zero.

What Password Strength Scores Do Not Measure

Strength checkers measure mathematical difficulty, not real-world security. Several important factors fall outside the score:

Strength scores are a useful proxy for brute-force resistance. They are not a complete security picture.

How the WildandFree Password Checker Scores Your Password

Our checker evaluates eight specific criteria and gives you a detailed checklist alongside the overall score:

  1. At least 8 characters
  2. At least 12 characters (bonus for additional length)
  3. Contains uppercase letters
  4. Contains lowercase letters
  5. Contains numbers
  6. Contains special characters
  7. No common patterns (123, abc, qwerty)
  8. No repeated character sequences (aaa, 111)

The strength label (Very Weak through Very Strong) combines the checklist results with an entropy calculation. Crack time is displayed separately and assumes the 10B/sec offline attack model. The tips section fires when specific criteria fail, telling you exactly what to change rather than just showing a red bar.

Everything runs in your browser — the algorithm is the same whether you check one password or fifty.

See the Algorithm in Action — Check Your Password Now

Enter any password to see its entropy score, crack time estimate, and exactly which criteria it passes or fails. Runs entirely in your browser.

Open Password Strength Checker

Frequently Asked Questions

What is a good entropy score for a password?

Security experts generally recommend at least 50-60 bits for everyday accounts and 80+ bits for high-value accounts. A 12-character password using uppercase, lowercase, numbers, and symbols achieves roughly 78 bits. A 20-character version of the same hits around 130 bits.

Why does "correcthorsebatterystaple" score higher than "Tr0ub4dor&3"?

The four random words are longer (28 characters vs 11) and achieve higher entropy despite using only lowercase letters and spaces. Length contributes more to entropy than character variety, especially once you exceed 20+ characters. This is the core insight from the XKCD comic on password strength.

Does a higher strength score mean the password is safe to use?

It means it is harder to brute-force. A high-scoring password can still be compromised if it has appeared in a breach database, is phished out of you, or is reused across multiple accounts. Strength score is one dimension of security, not all of it.

Can I trust the crack time estimates?

They are accurate for the assumed attack model: 10 billion guesses per second with offline brute force. Real-world attack speeds vary based on hardware and the hashing algorithm used to store the password. Against slower hashing algorithms (bcrypt, Argon2), crack times would be orders of magnitude longer.

Ryan Callahan
Ryan Callahan Lead Software Engineer

Ryan architected the client-side processing engine that powers every tool on WildandFree — ensuring your files never leave your browser.

More articles by Ryan →
Launch Your Own Clothing Brand — No Inventory, No Risk