Password Entropy Explained: Why "P@ssword123" Is Not a Strong Password
Every data breach investigation reveals the same uncomfortable truth: the most common password in the leaked dataset is almost always "123456," followed closely by "password" and "qwerty." Despite decades of security awareness campaigns, human password habits remain catastrophically weak.
The problem isn't just laziness — it's a fundamental misunderstanding of what makes a password strong. Most people think complexity (adding a ! and a capital letter) equals security. The mathematics tells a different story entirely. The metric that actually matters is entropy.
1. What Is Password Entropy?
Entropy, in information theory, measures unpredictability. For passwords, higher entropy means more guesses required for a brute-force attack.
The formula is: Entropy (bits) = logâ‚‚(NË¢)
Where:
- N = the size of the character pool (26 for lowercase only, 52 with uppercase, 62 with digits, etc.)
- s = password length
So a password's entropy is determined by two things: character set size and length. And length matters exponentially more than complexity.
2. The Brutal Math: How Fast Can Your Password Be Cracked?
Let's put numbers on the board. Assume an attacker can try 1 billion guesses per second (a realistic figure for offline attacks against fast hash functions like MD5 or SHA-1, using consumer GPU hardware):
| Password | Character Pool (N) | Length (s) | Entropy | Time to Crack |
|---|
abc123 | 36 | 6 | ~31 bits | < 1 second |
P@ssw0rd | 95 | 8 | ~52 bits | ~1 hour |
Tr0ub4dor&3 | 95 | 11 | ~72 bits | ~4,000 years |
correct horse battery staple | 27 | 28 | ~133 bits | Effectively forever |
Notice: correct horse battery staple (from the famous XKCD comic) is vastly stronger than Tr0ub4dor&3 — not because it's more "complex," but because it's longer. Length always beats character gymnastics.
3. Why Password Policies Are Often Wrong
Many corporate password policies are actively counterproductive:
- "Must include uppercase, lowercase, digit, and special character": This rule shrinks the search space. Attackers know every valid password must contain at least one of each, which eliminates large swaths of possible combinations from consideration.
- "Must be exactly 8 characters": At 8 characters, even with the full 95-character printable ASCII set, entropy is only ~52 bits — crackable in hours with dedicated hardware.
- "Must change every 90 days": Forced rotation leads to predictable patterns:
Spring2026! becomes Summer2026!. Users increment a digit or swap a season, and attackers model these patterns.
NIST's current guidelines (SP 800-63B) explicitly recommend against these outdated practices, favoring length over complexity and eliminating forced rotation.
4. The Four Pillars of Actual Password Security
Here is what actually protects passwords:
- Length over complexity: A 16-character all-lowercase password (entropy ~75 bits) is stronger than an 8-character password using every symbol on the keyboard (entropy ~52 bits). Every additional character doubles the attack surface.
- Uniqueness across services: Password reuse is the #1 cause of account compromise. If Service A is breached and you reused its password on Service B, no amount of entropy saves you.
- A password manager: Human brains cannot generate and remember 50 unique, high-entropy passwords. A password manager generates true random strings and stores them encrypted.
- Multi-factor authentication (MFA): Even if a password is compromised, MFA prevents account access. A stolen password plus a required TOTP code or hardware key is a solved problem for the attacker only if they compromise both factors.
5. How to Generate a Strong Password That's Also Memorable
The XKCD method — four random common words strung together — remains one of the best approaches:
- Pick 4-6 random words from a dictionary of ~5,000 common words.
- Each word contributes ~12 bits of entropy.
- Four words = ~48 bits with the dictionary space alone, plus more from separators and capitalization choices.
- The result: "surface-tractor-battery-window" — memorable, typeable, and mathematically formidable.
Or, use a password manager's built-in generator to create a truly random 20-character string and never think about it again.
Conclusion
Password strength is math, not vibes. "P@ssword123" is weak not because it lacks special characters (it doesn't), but because it's short, predictable, and exists in every attacker's dictionary. The fix isn't more exclamation marks — it's more characters, more randomness, and never reusing the same one twice.