Short numeric PIN
Input: 1234
Output: Length 4, alphabet 10 → 13.3 bits. Cracked online in seconds; offline instant.
500+ fast, free tools. Most run in your browser only; Image & PDF tools upload files to the backend when you run them.
Calculate the entropy of any password in bits and estimate the brute-force time for various attack speeds.
The Password Entropy Calculator computes the information-theoretic entropy of a password in bits, based on the size of the character set used and the password length. Higher entropy means more possible passwords and therefore exponentially harder brute-force attacks. The tool identifies which character classes are used (lowercase, uppercase, digits, symbols), calculates the resulting pool size, and computes entropy as log2(pool^length). It then estimates cracking time across multiple attack scenarios: online throttled (100/s), offline slow hash (10k/s), offline fast hash (10B/s), and GPU cluster (100T/s). This helps users understand the practical security of their password choices.
Input: 1234
Output: Length 4, alphabet 10 → 13.3 bits. Cracked online in seconds; offline instant.
Input: Pa55word
Output: Length 8, alphabet ~62 → 47.6 bits — but pattern warning fires (substitutions reduce real entropy to ~25 bits). GPU cluster: instant.
Input: kT9!fZ2qLm@8nVbX
Output: Length 16, alphabet ~94 → 104.8 bits. GPU cluster: ~2 trillion years — adequate for high-value secrets.
Input: correct horse battery staple thunder ribbon
Output: Length 6 words, alphabet 7776 → 77.5 bits. Offline fast hash: ~600 years — strong enough for general-purpose use.