Skip to main content
AtoolinBlog
All Posts

How to Generate a Strong Password (Without a Password Manager)

By Hans5 min read

A strong password is at least 16 characters long, mixes uppercase letters, lowercase letters, numbers, and symbols, and does not appear in any known data breach list. Length matters more than complexity. A 16-character random string is far harder to crack than an 8-character string loaded with special characters, even if the shorter one looks more "complex" at a glance.

What Makes a Password Strong

Password strength comes down to entropy, the number of possible combinations an attacker must check. Entropy is measured in bits, and each bit doubles the search space.

  • A random lowercase-only password has about 4.7 bits per character (26 possible characters).
  • Add uppercase: ~5.2 bits per character (52 possible characters).
  • Add digits and symbols: ~6.5 bits per character (90+ possible characters).
  • Each additional character multiplies the total combinations exponentially.

To resist modern brute-force attacks, you need at least 80 bits of entropy. What that requires in practice:

Character Set Characters Needed for 80-bit Security
Lowercase only (26 chars) 17 characters
Mixed case + digits (62 chars) 14 characters
Mixed case + digits + symbols (94 chars) 13 characters
Random words from a 2,000-word list 6 words

Length beats complexity. A 16-character random alphanumeric password (about 95 bits) is stronger than a 10-character password filled with @, !, and # (about 65 bits).

A free online password generator creates a cryptographically random password meeting all these criteria. Generate one in seconds at atoolin.com/password-generator/.

How Long Would It Take to Crack Your Password?

Modern GPUs can test billions of password guesses per second against stolen password hashes. The table below assumes 94 printable ASCII characters and 10 billion guesses per second, a realistic figure for offline attacks with consumer hardware in 2024:

Password Length Combinations Estimated Crack Time
8 characters 6.1 × 10¹⁵ ~7 minutes
10 characters 5.4 × 10¹⁹ ~63 days
12 characters 4.8 × 10²³ ~1,500 years
16 characters 3.8 × 10³¹ ~1.2 billion years
20 characters 3.0 × 10³⁹ effectively infinite

Eight characters is no longer safe. Even with symbols. Most major password breaches exposed 8-character passwords cracked within hours using dictionary attacks and rule-based mutations.

These estimates apply to offline attacks against stolen hashes. Online attacks against login forms are slower because of rate limiting, but rate limiting should not be your primary protection.

Why "Correct Horse Battery Staple" Works

In 2011, the webcomic xkcd proposed combining four random common words. "Correct horse battery staple" has about 44 bits of entropy if the words come from a list of 2,000 common words (log₂(2000⁴) ≈ 44 bits). That is weak by modern standards.

A six-word passphrase from the same list reaches 66 bits. Seven words: 77 bits. The real advantage is that humans retain concrete nouns far better than character strings like xQ7@mP2#.

The EFF Diceware wordlist (7,776 words) is designed for this. Each word contributes about 12.9 bits — five words gives 64 bits, six words gives 77 bits.

Use a passphrase for the one password you must type from memory: your computer login or email account. Use a random character string for everything else, especially accounts stored in a password manager where you never type the password by hand.

Common Password Mistakes

Substitutions are not entropy. Changing e to 3 or a to @ is a well-known mutation rule that cracking tools apply automatically. P@ssw0rd! fails in under a second.

Personal information is guessable. Birth years, pet names, team names, and wedding dates appear in targeted attack wordlists. If it is on your social media profile, assume it is in an attacker's dictionary.

Short passwords with maximum complexity still lose. Complexity adds a modest multiplier; length adds exponential combinations. A 12-character lowercase-only random password beats an 8-character one with all four character classes.

Reusing passwords is the highest-risk habit. A credential stuffing attack takes credentials from one breach and tries them on hundreds of other services automatically. One reused password can compromise a dozen accounts in minutes.

Incrementing a password is not changing it. Password2025 gets tested immediately after Password2024 in any modern attack.

FAQ

What is the minimum length for a strong password in 2025?

Sixteen characters is the practical minimum for accounts holding sensitive data. Twelve characters with a full character set is acceptable for low-risk accounts. Any password shorter than twelve characters can be cracked offline in under a year with consumer hardware, regardless of how complex it looks.

Is it safe to use a random password generator online?

Yes, if the tool uses your browser's built-in cryptographic RNG — specifically window.crypto.getRandomValues() in JavaScript. This generates unpredictable randomness from your device's entropy source and never sends data to a server. A quick test: load the page, turn off your internet connection, then generate a password. If it still works, generation is happening locally.

How many passwords should I change after a data breach?

Change the breached account's password immediately, then check whether you reused that exact password anywhere else — those accounts need new passwords too. Use Have I Been Pwned (haveibeenpwned.com) to confirm whether your email appears in known breach databases. Do not wait for the breached company to notify you.