{"id":27371,"date":"2024-05-06T14:20:57","date_gmt":"2024-05-06T22:20:57","guid":{"rendered":"https:\/\/www.spokeo.com\/compass\/?p=27371"},"modified":"2024-05-06T14:20:58","modified_gmt":"2024-05-06T22:20:58","slug":"what-to-know-about-password-entropy","status":"publish","type":"post","link":"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/","title":{"rendered":"Password Entropy: How to Know if Your Passwords Are Strong or Not"},"content":{"rendered":"\n<p>There was a time, just a couple of decades ago, when sensitive data about you was pretty hard to find.&nbsp;&nbsp;<\/p>\n\n\n\n<p>Now, of course, we live our lives online, and our sensitive information \u2013 and more \u2013 is frequently stored by the apps and websites we use.&nbsp; The companies protect that data, in part, by asking us to identify ourselves through passwords when we log in.&nbsp; That means choosing, and remembering, a whole lot of strong, safe passwords.&nbsp; There are lots of rules for creating those passwords, but how do you know whether your password is really tough to crack?&nbsp; Well, there\u2019s an actual measure for that called \u201cpassword entropy,\u201d that can tell you. Here\u2019s how it works, and how to check a password\u2019s strength for yourself.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">What is Password Entropy?&nbsp;<\/h2>\n\n\n\n<p>The concept of entropy is borrowed from the world of physics.\u00a0 A German physicist named Rudolf Clausius <a href=\"https:\/\/www.britannica.com\/science\/entropy-physics\" target=\"_blank\" rel=\"noreferrer noopener\">coined the term in 1850<\/a>, as a measure of the degree of randomness or uncertainty in a system.\u00a0 Randomness is bad in some contexts, like management decisions or your kitchen cupboards, but in the case of passwords, it\u2019s essential.\u00a0 Randomness is what makes a password hard to guess, by other humans or (more importantly) by computers.\u00a0<\/p>\n\n\n\n<p>So, what affects the randomness, and therefore the degree of entropy, in a system?&nbsp; There are factors that increase a password\u2019s entropy, and others that reduce it.&nbsp; The next few paragraphs are a simplification, perhaps an oversimplification, but they\u2019re enough to give you a working understanding of the principles involved.&nbsp; First, we have factors that increase entropy.&nbsp; Those include:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Password Length<\/h3>\n\n\n\n<p>Password length is the biggest single factor that contributes to entropy, and therefore to password strength.&nbsp; Suppose you\u2019re using a 6-letter password, drawn from the lower-case letters from a to z.&nbsp; That gives 230,230 possible combinations (there\u2019s a formula for this, but you can just use <a href=\"https:\/\/www.calculatorsoup.com\/calculators\/discretemathematics\/combinations.php\">an online calculator<\/a> to see for yourself).&nbsp; Increasing to just 8 letters increases that number to over 1.5 million, and 10 letters takes you to over 5.3 million.&nbsp; Your four-digit bank PIN, on the other hand, yields a trivial 256 possibilities.&nbsp;<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"684\" src=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/rc-xyz-nft-gallery-q7h8LVeUgFU-unsplash.jpg?resize=1024%2C684&#038;ssl=1\" alt=\"rows of keys symbolizing password entropy\" class=\"wp-image-27372\" srcset=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/rc-xyz-nft-gallery-q7h8LVeUgFU-unsplash-scaled.jpg?resize=1024%2C684&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/rc-xyz-nft-gallery-q7h8LVeUgFU-unsplash-scaled.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/rc-xyz-nft-gallery-q7h8LVeUgFU-unsplash-scaled.jpg?resize=768%2C513&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/rc-xyz-nft-gallery-q7h8LVeUgFU-unsplash-scaled.jpg?resize=1536%2C1026&amp;ssl=1 1536w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/rc-xyz-nft-gallery-q7h8LVeUgFU-unsplash-scaled.jpg?resize=585%2C391&amp;ssl=1 585w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/rc-xyz-nft-gallery-q7h8LVeUgFU-unsplash-scaled.jpg?resize=263%2C175&amp;ssl=1 263w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/rc-xyz-nft-gallery-q7h8LVeUgFU-unsplash-scaled.jpg?resize=1320%2C881&amp;ssl=1 1320w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/rc-xyz-nft-gallery-q7h8LVeUgFU-unsplash-scaled.jpg?w=1153&amp;ssl=1 1153w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Pexels<\/figcaption><\/figure>\n\n\n\n<h3 class=\"wp-block-heading\">The Character Set<\/h3>\n\n\n\n<p>That brings us to another main factor, the number of possible characters in use.&nbsp; Your bank PIN uses the numerals from 0 to 9, for a total of 10.&nbsp; The lower-case alphabet gives you 26 possibilities, and the upper-case alphabet adds another 26.&nbsp; The set of special characters that\u2019s usually available to use in passwords adds another 30.&nbsp; That gives us a total of 92 possible characters (10+26+26+30).&nbsp; Now, let\u2019s go back to our calculator.&nbsp;<\/p>\n\n\n\n<p>If you take an 8-character password from just the 10 numerals, there are only 45 possible combinations.&nbsp; If you choose that same 8-character password from all 92 of the available characters, now there are over 93 <em>billion<\/em> possible combinations!&nbsp; That\u2019s why so many passwords now require you to use uppercase and lowercase letters, numerals, and special characters.&nbsp;<\/p>\n\n\n\n<p>On the opposite side of the ledger, there are factors that reduce password entropy.&nbsp; Unfortunately, they\u2019re exactly the things that make passwords easier for humans to use.&nbsp; Some of the most important include:&nbsp;<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Already-Known Passwords<\/h3>\n\n\n\n<p>Potential hackers already have a pool of hundreds of millions of known passwords at their disposal.\u00a0 They\u2019re the cumulative total of all the data breaches we\u2019ve seen to date, and you can probably remember lots of headlines about those even if you aren\u2019t a regular reader of this blog.\u00a0 People tend to reuse their passwords across multiple sites, and to make many of the same obvious choices when creating one; that\u2019s why you\u2019ll see lists of \u201cworst\u201d or <a href=\"https:\/\/nordpass.com\/most-common-passwords-list\/\" target=\"_blank\" rel=\"noreferrer noopener\">\u201cmost common\u201d passwords<\/a> every year.\u00a0<\/p>\n\n\n\n<h3 class=\"wp-block-heading\">Easily Guessable Words and Phrases<\/h3>\n\n\n\n<p>This is almost, but not quite, the same.&nbsp; In addition to those \u201cknown-to-be-bad\u201d passwords, we tend to make a lot of choices that are equally easy for hackers to decipher.&nbsp; That includes joining the word \u201cpassword\u201d itself with the name of the service (resulting in passwords like <em>paypalpassword<\/em> or <em>spotifypassword<\/em>), or using combinations of the names of your kids, parents, or pets. Those are specific to you, at least to some extent (you\u2019re probably not the only Jennifer or Jose to be born in the same year, or have a dog named Rex).&nbsp; Any attacker who can see your social media accounts can guess those pretty easily.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">How to Calculate Password Entropy<\/h2>\n\n\n\n<p>Buckle up, we\u2019ve got math incoming!\u00a0 Don\u2019t worry, there are online<a href=\"https:\/\/www.omnicalculator.com\/other\/password-entropy\" target=\"_blank\" rel=\"noreferrer noopener\"> password entropy calculators<\/a> available for this too, but first, we\u2019ll make our former math teachers happy and show our work.\u00a0 Fittingly, we\u2019ll draw on explanations from <a href=\"https:\/\/www.pleacher.com\/mp\/mlessons\/algebra\/entropy.html\" target=\"_blank\" rel=\"noreferrer noopener\">an award-winning former math teacher<\/a>.<br><br>The equation itself looks like this: E = log<sub>2<\/sub>(R<sup>L<\/sup>).\u00a0 In this equation E stands for Entropy, L is the length of your password, and R is the range of possible characters to choose from.\u00a0 So the R<sup>L<\/sup> in parentheses means your number of characters, to the power of the length of your password, which is the maximum possible number of combinations.\u00a0 The log<sub>2<\/sub> part means (deep breath) \u201chow many 2s you need to multiply to get the number in parentheses.\u201d\u00a0<\/p>\n\n\n\n<p>Let\u2019s pick an easy example to start with.&nbsp; Suppose your PIN is any 2 of 4 possible numbers.&nbsp; In this case (R<sup>L<\/sup>) is 4<sup>2<\/sup>, or 4&#215;4, which is 16 possible combinations.&nbsp; The log<sub>2<\/sub> value of 16 is 4, because it\u2019s 2x2x2x2 (four 2s).&nbsp; Entropy is measured in \u201cbits,\u201d so the entropy of this particular password is just 4 bits. That\u2019s laughably weak, of course, so let\u2019s look at an 8-letter password drawn from the 26 letters of the lowercase alphabet.&nbsp; Those 26 letters to the 8th power give us 208,827,064,576 total possibilities.&nbsp; The log<sub>2<\/sub> of 208,827,064,576 is 37.6 bits of entropy, which is a big improvement.&nbsp;<\/p>\n\n\n\n<p>Online security vendor Okta suggests aiming for <a href=\"https:\/\/www.okta.com\/identity-101\/password-entropy\/\">passwords with <\/a><a href=\"https:\/\/www.okta.com\/identity-101\/password-entropy\/\" target=\"_blank\" rel=\"noreferrer noopener\">6<\/a><a href=\"https:\/\/www.okta.com\/identity-101\/password-entropy\/\">0 bits of entropy<\/a> or better, and our retired math teacher also considers 60 bits or higher to be <a href=\"https:\/\/www.pleacher.com\/mp\/mlessons\/algebra\/entropy2.html\" target=\"_blank\" rel=\"noreferrer noopener\">adequate for banking <\/a>or other sensitive information.\u00a0 So let\u2019s try again, with a 10-letter password drawing on all 92 of the commonly-available characters.\u00a0 That gives us 43,438,845,422,363,213,824 possibilities, and 65.24 bits of entropy.\u00a0 Bingo!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Real-world Password Entropy Depends on More than Math<\/h2>\n\n\n\n<p>Unfortunately, password entropy in any real-world sense depends on more than just the math.&nbsp; In fact, the underlying math is the easy part.&nbsp; Why?&nbsp; Well, let\u2019s suppose the password for your Amazon account was \u201cAmAz0nP@ssword!\u201d.&nbsp; That\u2019s 15 characters, and it includes upper- and lower-case letters, numerals, and a special character.&nbsp; That\u2019s good, right?&nbsp; Sadly it\u2019s not, because \u2013 as we\u2019ve already mentioned \u2013 it\u2019s made up of easily guessable words, with highly predictable substitutions.&nbsp; It would look solid based on the math, but for practical purposes, its entropy is quite low.&nbsp; Remember, it\u2019s a measure of <em>randomness<\/em> and <em>unpredictability<\/em>.&nbsp;<\/p>\n\n\n\n<p>This raises some fine points that aren\u2019t immediately obvious.\u00a0 One is that the math is only straightforward when all of the characters in your password are genuinely random (the kind you\u2019d get if they\u2019re generated by a password management app with a strong algorithm).\u00a0 It works differently if, say, six of those letters form a recognizable word, like Amazon, or even just a dictionary word.\u00a0 Those are easily guessed, and hackers can use what\u2019s called a \u201c<a href=\"https:\/\/www.csoonline.com\/article\/569677\/what-is-a-dictionary-attack-and-how-you-can-easily-stop-them.html\" target=\"_blank\" rel=\"noreferrer noopener\">dictionary attack<\/a>\u201d to guess them, so they may actually <em>reduce<\/em> the security of your password.\u00a0<\/p>\n\n\n\n<p>So, are you better off using phrases of real words, or a jumble of random characters? The answer is \u201cit depends.\u201d\u00a0 Some random-character generators use well-known algorithms, which generate predictable outcomes that hackers can exploit.\u00a0 Yet, some combinations of words (a passphrase) can be harder for computers to guess than you\u2019d think.\u00a0 That\u2019s why there are so many techniques for creating stronger passwords, some of which (good news!) even make them easier for humans.\u00a0<\/p>\n\n\n\n<figure class=\"wp-block-image size-large\"><img data-recalc-dims=\"1\" loading=\"lazy\" decoding=\"async\" width=\"1024\" height=\"683\" src=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-shkrabaanthony-5475814.jpg?resize=1024%2C683&#038;ssl=1\" alt=\"checking password entropy strength\" class=\"wp-image-27373\" srcset=\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-shkrabaanthony-5475814.jpg?resize=1024%2C683&amp;ssl=1 1024w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-shkrabaanthony-5475814.jpg?resize=300%2C200&amp;ssl=1 300w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-shkrabaanthony-5475814.jpg?resize=768%2C512&amp;ssl=1 768w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-shkrabaanthony-5475814.jpg?resize=585%2C390&amp;ssl=1 585w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-shkrabaanthony-5475814.jpg?resize=263%2C175&amp;ssl=1 263w, https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-shkrabaanthony-5475814.jpg?w=1155&amp;ssl=1 1155w\" sizes=\"auto, (max-width: 1024px) 100vw, 1024px\" \/><figcaption class=\"wp-element-caption\">Pexels<\/figcaption><\/figure>\n\n\n\n<h2 class=\"wp-block-heading\">How to Check Your Passwords for Strength and Safety<\/h2>\n\n\n\n<p>The theories behind those techniques are hard for experts to agree on, let alone for a layperson to grasp.\u00a0 If you\u2019re curious enough to take a quick look at some of the headache-inducing arguments involved, check out <a href=\"https:\/\/github.com\/tests-always-included\/password-strength\/blob\/master\/doc\/entropy-seems-wrong.md\" target=\"_blank\" rel=\"noreferrer noopener\">this explainer<\/a> by the creators of one password-entropy calculator, or the debate around <a href=\"https:\/\/www.explainxkcd.com\/wiki\/index.php\/936:_Password_Strength\" target=\"_blank\" rel=\"noreferrer noopener\">a popular XKCD webcomic<\/a> on the subject of password strength.\u00a0\u00a0<\/p>\n\n\n\n<p>Rather than trying to master the underlying logic or technology (which is a graduate-level topic in itself), it\u2019s easier to do a few quick, simple tests.&nbsp;<\/p>\n\n\n\n<ul class=\"wp-block-list\">\n<li>Review that list of \u201c<a href=\"https:\/\/nordpass.com\/most-common-passwords-list\/\" target=\"_blank\" rel=\"noreferrer noopener\">most common passwords<\/a>\u201d we spoke of, and check whether any of your passwords are on it.<\/li>\n\n\n\n<li>Check whether your passwords include any of the easily guessed words that compromise security: your name, your kids\u2019 names, the name of the site you\u2019re logging into, your favorite sports team, the actual word \u201cpassword,\u201d and so on.\u00a0<\/li>\n\n\n\n<li>Go to a site called \u201c<a href=\"https:\/\/haveibeenpwned.com\/Passwords\" target=\"_blank\" rel=\"noreferrer noopener\">Have I Been Pwned?<\/a>\u201d and enter in the handful of passwords you normally use, one at a time.\u00a0 This site maintains a database of passwords known to be compromised in various hacks and data breaches.\u00a0\u00a0<\/li>\n<\/ul>\n\n\n\n<p>If your current passwords fail any of those three tests, you should change them immediately (we\u2019ll circle back to this in a moment).&nbsp; If your passwords are good up to this point, pick any three password entropy calculators that come up for you in a search (Spokeo doesn\u2019t endorse or recommend any specific calculator).&nbsp; Enter your current passwords and see how each calculator rates them for entropy.&nbsp; If they\u2019re all rated at 60 bits or higher, great!&nbsp; Otherwise, they may need work.&nbsp;<\/p>\n\n\n\n<p>Why three different calculators?&nbsp; Because, as we mentioned a moment ago, even experts in the field differ on how the various criteria should be applied.&nbsp; Still, if three separate calculators all agree that you have a strong password, you probably do.&nbsp;<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Creating High-Entropy Passwords<\/h2>\n\n\n\n<p>We\u2019ve written before about techniques you can use to <a href=\"https:\/\/www.spokeo.com\/compass\/password-ideas-to-beat-hackers\/\" target=\"_blank\" rel=\"noreferrer noopener\">create strong passwords<\/a>, and if you revisit that article now you\u2019ll see how those suggestions create high levels of entropy.\u00a0 Another option is to pick out a well-respected password-generation app, or a <a href=\"https:\/\/www.spokeo.com\/compass\/best-ways-to-store-passwords\/\" target=\"_blank\" rel=\"noreferrer noopener\">password management app<\/a> that includes password generation among its features.\u00a0 Whether you prefer to \u201croll your own\u201d or have the app do it for you, it\u2019s a good idea to run them through an entropy calculator \u2013 just to be sure \u2013 before you use them.\u00a0<\/p>\n\n\n\n<p>It\u2019s also a good idea to have unique passwords for every single site or app you use.&nbsp; Unfortunately, that requirement puts an unrealistic strain on even the best memory, so for most of us it\u2019s only practical with a password management app.&nbsp; Pick one which can be used (and synced) across all of your devices, and that has lots of good reviews from independent third-party sources.&nbsp; Once it\u2019s set up, you\u2019ll only ever have one password to remember, and almost anybody can manage that!<\/p>\n\n\n\n<h2 class=\"wp-block-heading\">Final Thoughts<\/h2>\n\n\n\n<p>Passwords will eventually go away, because even the most secure passwords can be compromised through <a href=\"https:\/\/www.spokeo.com\/compass\/how-to-stop-spam-and-phishing-emails\/\" target=\"_blank\" rel=\"noreferrer noopener\">phishing attacks<\/a> and human error.\u00a0 New ways of securing your accounts will inevitably replace them, and one such technology \u2013 <a href=\"https:\/\/arstechnica.com\/information-technology\/2023\/05\/passwordless-google-accounts-are-easier-and-more-secure-than-passwords-heres-why\/\" target=\"_blank\" rel=\"noreferrer noopener\">passkeys <\/a>\u2013 is already rolling out, with support from tech heavyweights like Google and Apple.\u00a0 Until those improved technologies take over, passwords will remain your accounts\u2019 first line of defense.\u00a0 Mastering the art of the high-entropy password makes them a <em>lot<\/em> more effective.\u00a0<\/p>\n\n\n\n<p>And, if that proves too daunting, you should at least use <a href=\"http:\/\/www.spokeo.com\" target=\"_blank\" rel=\"noreferrer noopener\">Spokeo<\/a> and its people search tools to see what information you have put out on your social media accounts (including old ones you may have forgotten) that cybercriminals might be using to guess your passwords.\u00a0<\/p>\n\n\n\n<p><em>Fred Decker is a prolific freelance writer based in Atlantic Canada, with articles appearing in print and online since 2007.  He writes primarily on technology, personal finance, and food and foodservice, drawing on previous careers in those industries.  He was educated at Memorial University of Newfoundland, Nova Scotia Community College, and the Northern Alberta Institute of Technology.<\/em><\/p>\n\n\n\n<p>Sources<\/p>\n\n\n\n<p>Britannica: <a href=\"https:\/\/www.britannica.com\/science\/entropy-physics\" target=\"_blank\" rel=\"noreferrer noopener\">Entropy<\/a><\/p>\n\n\n\n<p>Calculator Soup: <a href=\"https:\/\/www.calculatorsoup.com\/calculators\/discretemathematics\/combinations.php\" target=\"_blank\" rel=\"noreferrer noopener\">Combinations Calculator (nCr)<\/a><\/p>\n\n\n\n<p>NordPass: <a href=\"https:\/\/nordpass.com\/most-common-passwords-list\/\">Top 200 Most Common Passwords (2023)<\/a><\/p>\n\n\n\n<p>Omni Calculator: <a href=\"https:\/\/www.omnicalculator.com\/other\/password-entropy\" target=\"_blank\" rel=\"noreferrer noopener\">Password Entropy Calculator<\/a><\/p>\n\n\n\n<p>Pleacher.com: <a href=\"https:\/\/www.pleacher.com\/mp\/mlessons\/algebra\/entropy.html\" target=\"_blank\" rel=\"noreferrer noopener\">Calculating Password Entropy<\/a><\/p>\n\n\n\n<p>Okta: <a href=\"https:\/\/www.okta.com\/identity-101\/password-entropy\/\" target=\"_blank\" rel=\"noreferrer noopener\">Password Entropy: The Value of Unpredictable Passwords<\/a><\/p>\n\n\n\n<p>Pleacher.com: <a href=\"https:\/\/www.pleacher.com\/mp\/mlessons\/algebra\/entropy2.html\" target=\"_blank\" rel=\"noreferrer noopener\">Password Entropy<\/a><\/p>\n\n\n\n<p>CSOOnline: <a href=\"https:\/\/www.csoonline.com\/article\/569677\/what-is-a-dictionary-attack-and-how-you-can-easily-stop-them.html\" target=\"_blank\" rel=\"noreferrer noopener\">What Is a Dictionary Attack? And How You can Easily Stop Them<\/a><\/p>\n\n\n\n<p>Github\/tests-always-included\/password-strength: <a href=\"https:\/\/github.com\/tests-always-included\/password-strength\/blob\/master\/doc\/entropy-seems-wrong.md\">Entropy Scor<\/a><a href=\"https:\/\/github.com\/tests-always-included\/password-strength\/blob\/master\/doc\/entropy-seems-wrong.md\" target=\"_blank\" rel=\"noreferrer noopener\">e<\/a><a href=\"https:\/\/github.com\/tests-always-included\/password-strength\/blob\/master\/doc\/entropy-seems-wrong.md\"> Seems Wrong<\/a><\/p>\n\n\n\n<p>\u201cXKCD Explained\u201d Wiki: <a href=\"https:\/\/www.explainxkcd.com\/wiki\/index.php\/936:_Password_Strength\" target=\"_blank\" rel=\"noreferrer noopener\">936 Password Strength<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>How strong are your passwords, really? Password entropy is how they\u2019re rated. Learn how to calculate password entropy, and how you can make your passwords as strong as possible. <\/p>\n","protected":false},"author":112,"featured_media":27374,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[614],"tags":[],"class_list":["post-27371","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-safety"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v24.9 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Password Entropy: Measure of Your Passwords\u2019 Strength | Spokeo<\/title>\n<meta name=\"description\" content=\"How strong are your passwords, really? Password entropy is how they\u2019re rated. Learn how to calculate password entropy, and how you can make your passwords as strong as possible.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Password Entropy: Measure of Your Passwords\u2019 Strength | Spokeo\" \/>\n<meta property=\"og:description\" content=\"How strong are your passwords, really? Password entropy is how they\u2019re rated. Learn how to calculate password entropy, and how you can make your passwords as strong as possible.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/\" \/>\n<meta property=\"og:site_name\" content=\"The Compass Blog | Digital Identity and People Search | Spokeo\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/Spokeo\/\" \/>\n<meta property=\"article:published_time\" content=\"2024-05-06T22:20:57+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-06T22:20:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.spokeo.com\/compass\/image\/pexels-padrinan-2882630.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"851\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Fred Decker\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:site\" content=\"@Spokeo\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Fred Decker\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"10 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/\",\"url\":\"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/\",\"name\":\"Password Entropy: Measure of Your Passwords\u2019 Strength | Spokeo\",\"isPartOf\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-padrinan-2882630.jpg?fit=1280%2C851&ssl=1\",\"datePublished\":\"2024-05-06T22:20:57+00:00\",\"dateModified\":\"2024-05-06T22:20:58+00:00\",\"author\":{\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\"},\"description\":\"How strong are your passwords, really? Password entropy is how they\u2019re rated. Learn how to calculate password entropy, and how you can make your passwords as strong as possible.\",\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/#primaryimage\",\"url\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-padrinan-2882630.jpg?fit=1280%2C851&ssl=1\",\"contentUrl\":\"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-padrinan-2882630.jpg?fit=1280%2C851&ssl=1\",\"width\":1280,\"height\":851,\"caption\":\"password entropy\"},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#website\",\"url\":\"https:\/\/www.spokeo.com\/compass\/\",\"name\":\"The Compass Blog | Digital Identity and People Search | Spokeo\",\"description\":\"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea\",\"name\":\"Fred Decker\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/\",\"url\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"contentUrl\":\"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g\",\"caption\":\"Fred Decker\"},\"url\":\"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Password Entropy: Measure of Your Passwords\u2019 Strength | Spokeo","description":"How strong are your passwords, really? Password entropy is how they\u2019re rated. Learn how to calculate password entropy, and how you can make your passwords as strong as possible.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/","og_locale":"en_US","og_type":"article","og_title":"Password Entropy: Measure of Your Passwords\u2019 Strength | Spokeo","og_description":"How strong are your passwords, really? Password entropy is how they\u2019re rated. Learn how to calculate password entropy, and how you can make your passwords as strong as possible.","og_url":"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/","og_site_name":"The Compass Blog | Digital Identity and People Search | Spokeo","article_publisher":"https:\/\/www.facebook.com\/Spokeo\/","article_published_time":"2024-05-06T22:20:57+00:00","article_modified_time":"2024-05-06T22:20:58+00:00","og_image":[{"width":1280,"height":851,"url":"https:\/\/www.spokeo.com\/compass\/image\/pexels-padrinan-2882630.jpg","type":"image\/jpeg"}],"author":"Fred Decker","twitter_card":"summary_large_image","twitter_creator":"@Spokeo","twitter_site":"@Spokeo","twitter_misc":{"Written by":"Fred Decker","Est. reading time":"10 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/","url":"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/","name":"Password Entropy: Measure of Your Passwords\u2019 Strength | Spokeo","isPartOf":{"@id":"https:\/\/www.spokeo.com\/compass\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/#primaryimage"},"image":{"@id":"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/#primaryimage"},"thumbnailUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-padrinan-2882630.jpg?fit=1280%2C851&ssl=1","datePublished":"2024-05-06T22:20:57+00:00","dateModified":"2024-05-06T22:20:58+00:00","author":{"@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea"},"description":"How strong are your passwords, really? Password entropy is how they\u2019re rated. Learn how to calculate password entropy, and how you can make your passwords as strong as possible.","inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/what-to-know-about-password-entropy\/#primaryimage","url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-padrinan-2882630.jpg?fit=1280%2C851&ssl=1","contentUrl":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-padrinan-2882630.jpg?fit=1280%2C851&ssl=1","width":1280,"height":851,"caption":"password entropy"},{"@type":"WebSite","@id":"https:\/\/www.spokeo.com\/compass\/#website","url":"https:\/\/www.spokeo.com\/compass\/","name":"The Compass Blog | Digital Identity and People Search | Spokeo","description":"The official Spokeo blog covers topics such as digital identity, consumer protection and privacy, how to avoid scams and catfishing, and more.","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.spokeo.com\/compass\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Person","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/14f02d6a4e1e4c54ba07beb53604eaea","name":"Fred Decker","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.spokeo.com\/compass\/#\/schema\/person\/image\/","url":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/ac8f0f8a3aa097a160698d73f55a83185f571e92a38de2d90e0560f4d8556d6b?s=96&r=g","caption":"Fred Decker"},"url":"https:\/\/www.spokeo.com\/compass\/author\/freddecker\/"}]}},"jetpack_featured_media_url":"https:\/\/i0.wp.com\/www.spokeo.com\/compass\/image\/pexels-padrinan-2882630.jpg?fit=1280%2C851&ssl=1","jetpack_shortlink":"https:\/\/wp.me\/p8V62u-77t","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/27371","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/users\/112"}],"replies":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/comments?post=27371"}],"version-history":[{"count":2,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/27371\/revisions"}],"predecessor-version":[{"id":27377,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/posts\/27371\/revisions\/27377"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media\/27374"}],"wp:attachment":[{"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/media?parent=27371"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/categories?post=27371"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.spokeo.com\/compass\/wp-json\/wp\/v2\/tags?post=27371"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}