Skip to main content
Technical

Strong Passwords: What Makes Them Secure

personWritten by Magnus Silverstream
calendar_todayNovember 4, 2025
schedule7 min read

In an era of constant data breaches, your password is often the only barrier between hackers and your personal information. Yet many people still rely on weak, easily guessable passwords. Understanding what makes a password truly strong isn't just about adding numbers and symbols - it's about understanding how attackers think and how modern cracking tools work. This guide breaks down the science of password security and provides practical strategies for creating passwords that are both secure and memorable.

How passwords get cracked

To create strong passwords, you need to understand how they're broken: Brute force attacks Trying every possible combination. A 6-character lowercase password has 308 million possibilities - crackable in seconds with modern hardware. Dictionary attacks Using lists of common words, names, and known passwords. "password123" and "qwerty" are tried within milliseconds. Hybrid attacks Combining dictionary words with common modifications: P@ssw0rd, Summer2024!, John1990. Rainbow tables Pre-computed hashes of common passwords. This is why websites should use salted hashes. Social engineering Gathering personal information (pet names, birthdays, favorite sports teams) from social media to guess passwords. Credential stuffing Using leaked passwords from one breach to access accounts on other sites - which is why password reuse is so dangerous.

The mathematics of password strength

Password strength is measured in entropy - the number of possible combinations expressed in bits. Entropy formula: log2(character set size ^ password length) Character sets: • Lowercase only (26): 6 chars = 28 bits • + Uppercase (52): 6 chars = 34 bits • + Numbers (62): 6 chars = 36 bits • + Symbols (95): 6 chars = 39 bits Length matters more than complexity: • 8 random lowercase letters: 38 bits • 12 random lowercase letters: 56 bits • 16 random lowercase letters: 75 bits Cracking time estimates (10 billion guesses/second): • 40 bits: ~2 minutes • 50 bits: ~1.5 days • 60 bits: ~4 years • 70 bits: ~3,700 years • 80 bits: ~3.8 million years Target at least 60-80 bits of entropy for important accounts.

Common password mistakes

Avoid these frequent errors: Predictable patterns • Capitalizing the first letter only: Password • Adding numbers at the end: password123 • Substituting obvious characters: p@ssw0rd • Using keyboard patterns: qwerty, 123456 Personal information • Names of family, pets, or partners • Birthdates or anniversaries • Favorite sports teams or players • Cities or schools Reusing passwords If one site is breached, all your accounts using that password are compromised. Over 80% of data breaches involve credential reuse. Too short Even with maximum complexity, passwords under 12 characters are increasingly vulnerable to modern cracking hardware. Not updating after breaches When a service you use reports a breach, change that password immediately - and any other account where you used it.

The passphrase approach

Passphrases use multiple random words to create long, memorable passwords: Example: "correct horse battery staple" Why passphrases work: • Length provides high entropy (4 random words ≈ 44-60 bits) • Easier to remember than random characters • Faster to type than complex passwords • Resistant to brute force attacks Creating strong passphrases: 1. Use 4-6 truly random words 2. Don't use related words or phrases 3. Don't use song lyrics, quotes, or book titles 4. Consider adding a number or symbol between words 5. Use a random word generator, not your own choices Example generators: • Diceware method (rolling dice to select words) • EFF word lists • Password manager generators Weak passphrase: "I love my dog Buddy" Strong passphrase: "umbrella seventeen piano cascade"

Password managers: the modern solution

Password managers solve the fundamental password problem: humans can't remember dozens of unique, complex passwords. How they work: • Generate random, unique passwords for each site • Store all passwords encrypted with one master password • Auto-fill credentials in browsers and apps • Sync across devices Benefits: • Every password can be truly random and unique • No password reuse across sites • Phishing protection (won't auto-fill on fake sites) • Secure notes for sensitive information • Breach monitoring and alerts Master password considerations: • This is the ONE password you must remember • Use a strong passphrase (5+ random words) • Never write it down digitally • Enable two-factor authentication Popular options: • Cloud-based: Bitwarden, 1Password, LastPass, Dashlane • Local-only: KeePass, KeePassXC • Browser built-in: Improving but less feature-rich

Multi-factor authentication

Even the strongest password isn't enough anymore. Multi-factor authentication (MFA) adds crucial protection: Authentication factors: • Something you know (password) • Something you have (phone, hardware key) • Something you are (fingerprint, face) MFA methods ranked by security: 1. Hardware security keys (FIDO2/WebAuthn) • Most secure option • Physical device required • Phishing-proof 2. Authenticator apps (TOTP) • Google Authenticator, Authy, etc. • Time-based one-time codes • Much better than SMS 3. Push notifications • Approve login on your phone • Convenient but can be spammed 4. SMS codes • Better than nothing • Vulnerable to SIM swapping • Use only if no other option available Prioritize enabling MFA on: • Email accounts (gateway to password resets) • Financial accounts • Social media • Password manager • Work accounts

Conclusion

A strong password combines length, randomness, and uniqueness. The most practical approach for most people is to use a password manager to generate and store unique random passwords for every account, protected by a strong master passphrase and multi-factor authentication. Remember: length beats complexity, randomness beats patterns, and a password manager beats human memory. Use our password generator to create cryptographically secure passwords that meet all modern security standards.

Frequently Asked Questions

Aim for at least 12-16 characters for important accounts. Longer is always better - a 20-character password is exponentially harder to crack than a 10-character one. For passphrases, use at least 4-5 random words.