Creating Strong Passwords: A Complete Security Guide
How attackers crack passwords and how to stop them. Learn password strategies, use password managers effectively, and set up two-factor authentication.
Why Passwords Still Matter
Data breaches are a fact of digital life. In any given year, billions of credentials are exposed through compromised databases, phishing campaigns, and software vulnerabilities. Despite years of predictions that passwords would be replaced by biometrics, passkeys, or other authentication methods, the humble password remains the primary gatekeeper for the vast majority of online accounts. Understanding how attackers crack passwords — and how to create ones that resist those attacks — is not optional security hygiene; it is a fundamental skill for anyone with an email address.
How Attackers Crack Passwords
Password cracking is not a single technique but a toolkit of approaches, each exploiting a different weakness. Understanding these methods reveals why certain passwords fail and others hold.
Brute Force: The Exhaustive Search
A brute-force attack tries every possible combination of characters until it finds the correct one. At first glance, this sounds hopelessly slow, but modern hardware has made it frighteningly fast. A single consumer-grade GPU can test billions of password hashes per second against weak hashing algorithms like MD5 or SHA-1. A six-character password drawn from lowercase letters offers roughly 309 million possible combinations — which a modern GPU chews through in well under a second. Extend that password to twelve characters with a mix of uppercase, lowercase, digits, and symbols, and the number of combinations explodes into the sextillions, pushing the estimated crack time beyond thousands of years even at billions of guesses per second.
This exponential scaling is the mathematical foundation of password security, and it is why length matters more than any other single property. Each additional character multiplies the search space by the size of the character set. Going from 8 to 12 characters with a 72-character alphabet (letters, digits, and common symbols) multiplies the number of possibilities by roughly 27 million. Going from 12 to 16 characters multiplies it again by the same factor. The numbers rapidly become astronomical, which is precisely the point.
Dictionary Attacks: Exploiting Human Predictability
Brute force is the blunt instrument. Dictionary attacks are the scalpel. Instead of trying every possible combination, a dictionary attack uses lists of known passwords, common words, names, dates, and popular phrases — then layers on common transformations. Attackers know that people capitalize the first letter, append a number or exclamation point, and substitute special characters for letters in predictable ways. These "clever" modifications were reverse-engineered from leaked password databases years ago, and they are now baked into every cracking tool on the market. A password like "P@$$w0rd!" might feel strong to the person who created it, but it falls to a dictionary attack with common substitution rules in seconds.
The attack dictionaries themselves are vast. The RockYou breach alone exposed 32 million passwords, providing attackers with a rich corpus of real human password choices. Combined with linguistic databases, name lists, and the contents of every subsequent breach, a modern dictionary attack can test hundreds of millions of plausible passwords before the attacker ever resorts to brute force. The lesson is stark: any password based on a real word, name, or phrase — no matter how cleverly modified — is fundamentally weaker than a random string of equivalent length.
Rainbow Tables: Trading Time for Space
A rainbow table is a precomputed lookup structure that maps common passwords to their hash values. When an attacker obtains a database of password hashes, they do not need to crack each hash on the fly — they simply look it up in the table and read off the corresponding plaintext password in near-instant time. A comprehensive rainbow table for short passwords can be gigabytes in size, but the lookup is practically instantaneous.
The defense against rainbow tables is salting: adding a unique random value to each password before hashing it, so that even identical passwords produce different hashes. Modern password hashing algorithms like bcrypt, scrypt, and Argon2 incorporate salting by design and are deliberately slow to compute, making both rainbow tables and brute force far less effective. But not every website uses modern hashing — older databases protected by plain MD5 or SHA-1 remain vulnerable, which is why breaches of legacy systems continue to expose millions of credentials.
Credential Stuffing: The Cost of Reuse
Credential stuffing does not crack passwords at all — it simply replays them. When a website is breached and its password database is leaked or decrypted, attackers take those username-and-password pairs and try them against hundreds of other services: email providers, banks, social media platforms, cloud storage, e-commerce sites. If you use the same password on multiple sites, a single breach compromises every account sharing that credential. The 2012 LinkedIn breach exposed 117 million credentials; attackers were still successfully using those passwords to infiltrate unrelated accounts years later, because millions of users had never changed them and had reused them across the web.
Phishing and Password Spraying
No password, however strong, can protect you if you hand it directly to an attacker. Phishing attacks use counterfeit login pages, urgent-sounding emails, and impersonation to trick users into entering their credentials on attacker-controlled sites. The sophistication of these attacks has grown enormously — modern phishing kits can clone a legitimate site's appearance pixel-for-pixel, complete with valid HTTPS certificates, making visual detection nearly impossible.
Password spraying takes the opposite approach: instead of targeting one account with many passwords, it tries a small number of extremely common passwords against a large number of accounts. Passwords like "Password1" or "Summer2024!" are tried against thousands of accounts simultaneously, staying below lockout thresholds while exploiting the statistical certainty that some users will have chosen these predictable strings.
The Mathematics of Entropy
Security researchers quantify password strength using entropy, measured in bits. Entropy represents the number of binary decisions an attacker would need to make to guess the password, assuming they know the method used to generate it but not the specific output. A password with 40 bits of entropy has roughly one trillion possible values; one with 80 bits has a number so large it exceeds the grains of sand on Earth by many orders of magnitude.
A truly random 16-character password drawn from a 72-character alphabet carries roughly 99 bits of entropy — far beyond the reach of any current or foreseeable cracking technology. A four-word passphrase selected randomly from a 7,776-word dictionary (the Diceware approach) carries about 51 bits, enough to withstand offline attacks for decades, though adding a fifth or sixth word pushes the entropy comfortably higher. The crucial insight is that entropy comes from the randomness of the selection process, not from the apparent complexity of the result. A password that looks complex but was chosen by a human — incorporating a name, a birthday, and a predictable letter substitution — may carry far less entropy than a simple-looking but randomly generated four-word passphrase.
Building Passwords That Hold
Random Generation: The Gold Standard
The most secure approach is to let a machine generate truly random passwords: strings of characters with no patterns, no dictionary words, and no human biases. The obvious drawback is memorability — no one can reliably remember dozens of random 16-character strings, which is why random generation is inseparable from password manager usage (more on this below). For every account except the one or two you must type from memory, random generation is the recommended approach. It produces maximum entropy, complete immunity to dictionary attacks, and no exploitable patterns whatsoever.
Passphrases: Strength Through Length
A passphrase strings together multiple randomly selected words to create a password that is both very long and relatively easy to remember. The concept was popularized by the famous XKCD comic "correct horse battery staple," and the underlying mathematics are sound: four words chosen at random from a large dictionary produce a passphrase with enough entropy to resist offline cracking for years, while six words create a barrier that is effectively permanent with current technology.
The critical caveat is random selection. The words must be chosen by a random number generator, not by a person. Humans are terrible at being random — we gravitate toward related words, favorite phrases, song lyrics, and personal associations, all of which drastically reduce the effective search space. "I love my dog Max" feels like a passphrase but is trivially guessable. "Quantum fish umbrella mountain" behaves like one, because a machine chose the words and no human association connects them. Always use a dedicated passphrase generator rather than your own imagination.
The One Rule That Trumps Everything Else
Use a unique password for every account. Full stop. A 128-bit-entropy password is worthless if it is shared across ten sites and one of them stores it in plaintext. The single most impactful action you can take for your digital security is to ensure that a breach on one platform never cascades into a breach on every other platform you use.
Password Managers: The Necessary Tool
Given that truly random, unique passwords are impossible to memorize at scale, a password manager is not a luxury — it is a necessary piece of security infrastructure. A password manager stores all your credentials in an encrypted vault, protected by a single master password or passphrase that you do memorize. It generates random passwords for each new account, auto-fills them in your browser (which eliminates keylogger risk, since you never actually type the password), and alerts you when a saved credential appears in a known data breach.
Modern password managers also provide a subtle but powerful anti-phishing defense: they match stored credentials to specific domains and will refuse to auto-fill on a lookalike URL. If you navigate to a phishing site that mimics your bank's login page but uses a slightly different domain, your password manager will not offer the credentials, creating a moment of friction that can stop an attack before it succeeds.
Reputable options include 1Password (polished UX with family and team plans), Bitwarden (open-source with a free tier and self-hosting option), and Apple's built-in Keychain (seamless within the Apple ecosystem). KeePass remains a solid choice for users who prefer a fully offline, open-source solution. The specific tool matters far less than the habit — pick one, migrate your passwords into it, and stop reusing credentials.
Your master password deserves special attention. It should be a strong passphrase — at minimum 16 characters, ideally randomly generated if you can manage to memorize one, and absolutely never used for any other account. Consider something like "Purple-Elephant-Dances-On-Volcanoes-7!" — long, random enough to resist dictionary attacks, and memorable through the vivid mental image it creates. This one password protects everything else, so it is worth investing the time to create and commit it to memory.
Two-Factor Authentication: The Second Lock
Even a perfect password can be compromised through phishing, a server-side breach, or malware on your device. Two-factor authentication (2FA) adds a second verification step, so an attacker who obtains your password still cannot log in without access to the second factor.
TOTP: The Practical Middle Ground
The most widely supported form of 2FA is the TOTP (Time-Based One-Time Password) code generated by authenticator apps like Google Authenticator, Authy, or 1Password. During setup, the service and your app share a secret key. From that point forward, both sides use the key and the current time to independently generate a six-digit code that changes every 30 seconds. Because the code is computed locally on your device and is valid only briefly, it cannot be intercepted and replayed the way a static password can. TOTP works offline, is free, and is supported by virtually every major online service.
SMS: Better Than Nothing, Worse Than Everything Else
SMS-based 2FA — where a code is sent as a text message — is better than having no second factor, but it carries real and well-documented vulnerabilities. SIM-swapping attacks, in which an attacker convinces a mobile carrier to transfer your phone number to a new SIM card, have been used to compromise high-profile accounts and steal cryptocurrency. SMS messages can also be intercepted through exploits in the SS7 signaling protocol that underpins the global phone network. If you have the option, always prefer an authenticator app over SMS.
Hardware Security Keys: The Strongest Option
The strongest form of consumer 2FA is a hardware security key compliant with the FIDO2/WebAuthn standard, such as a YubiKey or Google Titan key. These physical devices use public-key cryptography: during registration, the key generates a unique keypair and sends the public half to the server; during login, the server issues a cryptographic challenge that only the private key — which never leaves the device — can answer. Hardware keys are immune to phishing because the cryptographic handshake verifies the server's domain as part of the protocol. A fake login page cannot produce a valid challenge, so the key simply will not respond. For your most critical accounts — primary email, banking, and your password manager itself — a hardware security key provides the highest assurance currently available to consumers.
Security Questions: The Overlooked Weak Link
Security questions deserve a brief mention because they are frequently the weakest element of an otherwise solid security setup. Questions like "What is your mother's maiden name?" or "What city were you born in?" have answers that can often be found on social media, in public records, or through casual conversation. The pragmatic solution is to treat security questions as additional passwords: answer them with random strings or unrelated phrases (for instance, answering the "first pet" question with "Quantum-Elephant-9") and store the fabricated answers in your password manager alongside the account's credentials.
Putting It All Together
Security is not a single action but a layered practice. The most impactful steps are straightforward: adopt a password manager, generate a unique random password for every account, enable 2FA everywhere it is offered (preferring authenticator apps or hardware keys over SMS), and check whether your email appears in known breaches at haveibeenpwned.com. These steps, taken together, place you well ahead of the vast majority of internet users and make you a far less attractive target for opportunistic attackers.
Loopaloo's Password Generator creates cryptographically random passwords and passphrases of configurable length, directly in your browser with no server round-trip. The Password Strength Checker evaluates your existing passwords against entropy calculations and known breach databases, helping you identify and replace your weakest credentials first. Both tools process everything locally — nothing you type ever leaves your device.
Password security is not glamorous, and it demands a small investment of time and habit. But in a world where a single compromised credential can cascade into identity theft, financial loss, and months of painful remediation, that investment pays for itself many times over.
Related Tools
Password Generator
Generate ultra-secure passwords with presets (Simple to Paranoid), strength analysis, entropy calculation, crack time estimation, password history, and bulk generation
Password Strength Checker
Analyze password security with 10 criteria checks, entropy calculation, crack time estimation, character breakdown, warnings, and improvement suggestions
Related Articles
Try Our Free Tools
200+ browser-based tools for developers and creators. No uploads, complete privacy.
Explore All Tools