Password Combination Calculator
Choose character sets and length to see how many unique passwords exist, how much entropy they provide, and how long brute-force attacks might take.
Count of additional unique characters beyond the standard sets.
Character Set Size
62
Unique characters available per position
Total Combinations
3226266762397899821056
Number of distinct passwords
Entropy
71.45 bits
Information content
Strength
Strong
Based on entropy thresholds
Time to Crack (1B guesses/s)
5.11e+4 years
Assuming brute-force attack
How to Use This Calculator
- Select the character sets included in your password policy.
- Enter the password length and any custom characters available.
- Review the total number of combinations and entropy. Aim for at least 64 bits of entropy for strong passwords.
- Use the brute-force estimate to gauge how long attackers might take with high-end hardware.
Formula
Combinations = charsetlength
Entropy = log2(Combinations) = length × log2(charset)
Time to crack ≈ Combinations / (2 × attempts per second)
Entropy measures the unpredictability of passwords. Each additional bit doubles the search space, making brute-force attacks exponentially harder.
Full Description
Password strength depends on both length and variety of characters. Short passwords with small character sets are easy to guess, while long, diverse passwords resist brute-force attacks. This calculator helps security teams define policies and educates users about the benefits of strong passphrases.
Keep in mind that password managers can generate high-entropy passwords automatically. For memorized passwords, consider using passphrases with four or more random words to balance usability and security.
Frequently Asked Questions
Does this account for dictionary attacks?
No. The calculator assumes all passwords are random. Real-world attackers exploit common patterns, so avoid predictable substitutions and reuse.
What entropy level should I target?
Aim for at least 64 bits for important accounts and 100+ bits for long-term secrets. Many password managers default to 128-bit strength.
Why is the time-to-crack estimate so rough?
Hardware speeds vary, and attackers may exploit leaks or rules rather than pure brute force. The estimate offers a conservative baseline.
How do custom characters help?
Adding unique characters expands the charset and increases entropy. This is useful for passphrases that include spaces or unicode symbols.