Blog
Wild & Free Tools

Password Length vs Complexity — What NIST SP 800-63 Says You Should Do

Last updated: March 2026 6 min read
Quick Answer

Table of Contents

  1. What NIST SP 800-63B Actually Says
  2. The Math: Why Length Wins
  3. Why Mandatory Rotation Is Counterproductive
  4. What This Means for Your Passwords Today
  5. What Your IT Policy May Still Get Wrong
  6. Frequently Asked Questions

For years, IT policies required passwords with uppercase, lowercase, numbers, and at least one symbol — changed every 90 days. NIST retired that guidance. The current recommendation (NIST SP 800-63B) says length is more important than complexity, mandatory rotation does more harm than good, and blocking breached passwords matters more than character requirements.

What NIST SP 800-63B Actually Recommends

NIST Special Publication 800-63B is the federal standard for digital identity — the framework most US government agencies and many private companies use for authentication policies. The current version broke from decades of convention in several ways:

The rationale: complexity requirements create predictable patterns (Summer2024!), while long random passwords or passphrases are harder to crack without being harder for humans to create.

The Math: Why Length Beats Complexity

Password entropy (the measure of cracking difficulty) scales differently with length versus character variety:

For a password using uppercase + lowercase + digits (62 possible characters per position), going from 12 to 13 characters multiplies combinations by 62. That is a much larger increase than adding a symbol requirement to a 12-character password.

In practical terms: "treehouse-river-cloud-41" (24 chars, no symbols) is dramatically stronger than "Tr3H0u$e!" (9 chars, full complexity). The former has roughly 20x more entropy despite looking "simpler."

Sell Custom Apparel — We Handle Printing & Free Shipping

Why NIST Says to Stop Mandatory Password Rotation

The logic behind quarterly password rotation was sound in theory: even if a password is stolen, it expires before the attacker can use it extensively. In practice, forced rotation has the opposite effect.

When users know they must change a password every 90 days, they create predictable sequences: Password1 becomes Password2 becomes Password3. Attackers know this pattern and exploit it. Microsoft research found that mandatory rotation dramatically increases the use of weak, predictable passwords.

NIST's revised guidance: change passwords only when there is evidence of compromise (a breach notification, suspicious login activity, or a known data exposure). Keep strong passwords unchanged rather than rotating to weaker predictable ones.

This represents a genuine shift in security thinking — from "security through inconvenience" to "security through actual strength."

What This Means for Your Passwords Today

If your passwords were created under the old rules (8 characters, mandatory complexity, quarterly rotation), here is the practical upgrade path:

  1. Prioritize length: Replace short complex passwords with longer ones. A 16-character password with only mixed case and digits is stronger than an 8-character password with all four character types.
  2. Use passphrases for memorable passwords: Four unrelated random words separated by hyphens gives you 25+ characters that are easy to type.
  3. Stop rotating strong passwords: If a password is long, random, and unique to one service, do not change it unless there is a breach.
  4. Check for breach exposure: A strong password that has appeared in a breach database is compromised regardless of its strength score. Use a breach checker separately — strength checkers do not cover this.
  5. Use different passwords per service: NIST emphasis on breach blocking assumes your passwords are unique. Reusing a strong password eliminates the benefit.

What Your Corporate IT Policy May Still Get Wrong

NIST updated its guidelines in 2017 and has refined them since. Most corporate IT policies have not caught up. Common rules that NIST no longer recommends:

If your organization enforces any of these, the policies were written before the current evidence base. NIST SP 800-63B is publicly available and free to reference when advocating for policy updates.

Check If Your Current Password Meets Modern Standards

Enter any password and see how it scores against length, entropy, and the factors NIST actually recommends measuring. Fully private — nothing leaves your browser.

Open Password Strength Checker

Frequently Asked Questions

Does NIST say to never use special characters?

No. NIST says you should not mandate special characters as a requirement when you can instead encourage longer passwords. Special characters still increase entropy — the point is that length is more effective per policy requirement, and complexity mandates lead to predictable workarounds.

Should I change my passwords every 90 days?

NIST no longer recommends mandatory periodic rotation. Change passwords when there is evidence of compromise — a breach notification, suspicious activity, or a known exposure. Strong, unique passwords can remain unchanged indefinitely if there is no sign of compromise.

What is the minimum password length NIST recommends?

NIST SP 800-63B sets a minimum of 8 characters but recommends supporting up to 64 characters and encouraging users to use longer passwords. For high-value accounts, 16+ characters is considered appropriate by most security practitioners.

If length is more important than complexity, can I use a long dictionary word?

A single dictionary word — even a very long one — is still vulnerable to dictionary attacks. NIST's advice is about length combined with randomness. A long sequence of random characters or unrelated random words provides the benefits. "supercalifragilistic" alone is weaker than "cloud-river-desk-41" because the latter is four unpredictable words.

Chris Hartley
Chris Hartley SEO & Marketing Writer

Chris has been in digital marketing for twelve years covering SEO tools and content optimization.

More articles by Chris →
Launch Your Own Clothing Brand — No Inventory, No Risk