How to Create Strong Passwords That Are Hard to Crack

Length, randomness, and uniqueness are the three pillars of a strong password. Learn the science behind password strength and how to apply it to all your accounts.

Strong password creation guide illustration
1Password Science

The Science of Password Strength: What Actually Makes a Password Secure

Password strength is determined by entropy — a mathematical measure of unpredictability. The more entropy a password has, the more guesses an attacker needs to crack it. Entropy is determined by two factors: the length of the password and the size of the character set used. A password drawn from lowercase letters only (26 characters) has less entropy per character than one drawn from all printable ASCII characters (95 characters), but length has a dramatically larger impact than character set size.

Modern password-cracking hardware can test billions of passwords per second. A graphics processing unit (GPU) cluster commonly used by security researchers and attackers alike can test around 100 billion passwords per second against common hashing algorithms. Against this backdrop, an 8-character password — even one using uppercase, lowercase, numbers, and symbols — can be cracked in a matter of hours. A 16-character random password using the same character set would take millions of years with the same hardware. The difference is length.

This is why security guidance has shifted from complexity requirements (mixing character types) to length requirements. The US National Institute of Standards and Technology (NIST) updated its password guidelines to de-emphasise complexity rules and instead recommend longer passwords without mandatory rotation. What matters is that the password is long, random, and unique — not that it ticks arbitrary boxes around which types of characters it includes.

  • Entropy determines strength: Length and character set size determine how many guesses an attacker needs
  • Length is paramount: Each additional character multiplies the number of possible combinations exponentially
  • Modern cracking speed: GPU clusters can test 100+ billion combinations per second against some hash types
  • 8-character passwords: Can be cracked in hours to days even with full character set complexity
  • 16+ character passwords: Would take millions of years to brute-force with current technology
  • NIST guidance: Length over complexity — favour longer passwords over mandatory character mixing rules
How hackers crack passwords — techniques explained →
Password entropy and strength diagram
2Weak vs Strong

What Makes a Password Weak — Common Patterns to Avoid

Security researchers who analyse leaked password databases consistently find the same patterns dominating the most common passwords used globally. The top 100 most common passwords account for a disproportionate share of all accounts — if attackers test just these 100 passwords against a leaked database of usernames, they typically compromise millions of accounts immediately. This is why password dictionaries used in attacks contain not just simple words but predictable variations: "Password1!", "Summer2024", and "Welcome@1" all follow the same predictable substitution patterns that humans instinctively use.

Personal information is another major weakness. Attackers routinely harvest publicly available data from social media — names, birthdays, anniversaries, pet names, schools attended, sports teams — and feed it into targeted password-guessing attacks known as "rule-based" or "personalised" attacks. If your password incorporates your name, your child's birth year, or your favourite sports team, it is far weaker than its apparent complexity suggests, because this information is often easily discoverable.

Keyboard patterns represent a third major vulnerability. Sequences like "qwerty", "123456", "asdfgh", and "zxcvbn" appear in every serious password cracking dictionary. So do short words with appended numbers or symbols: "dragon1", "sunshine!", "letmein#". Even "clever" substitutions like replacing 'a' with '@' or 'e' with '3' are so universally known that they provide minimal additional protection — attackers' rule engines apply these transformations automatically.

  • Common words: Dictionary words — even obscure ones — are tested first in dictionary attacks
  • Personal information: Names, birthdays, pet names, and schools can be easily researched and exploited
  • Keyboard patterns: "qwerty", "123456", and similar sequences appear in all password cracking dictionaries
  • Predictable substitutions: "@" for "a", "3" for "e", "0" for "o" — attackers apply these rules automatically
  • Short passwords: Under 12 characters can typically be brute-forced in hours with modern hardware
  • Reused passwords: Using the same password across sites means one breach exposes all your accounts
15 password mistakes that put you at risk →
Characteristics of a weak vs strong password
3Strong Password Methods

Three Methods for Creating Strong Passwords

The gold standard method for creating strong passwords is to use a password manager's built-in generator. This produces truly random strings of characters at whatever length you specify — 20, 24, or even 32 characters. Because you never need to type or remember these passwords (the manager auto-fills them), there is no practical downside to using very long, complex random strings for every account. This is the method we recommend for all account passwords except your master password itself.

For passwords you need to remember — your master password, your device unlock PIN, or passwords for critical accounts you might need to access without to Spot and Avoid Attacks on Your Phone">your phone — passphrases are the most practical approach. A passphrase is a sequence of four or more random words: "ocean-lamp-tiger-clock" or "purple-train-seven-mango". These are long enough (typically 25-35 characters with separators) to be computationally infeasible to crack while being memorable enough to recall. The key is that the words must be genuinely random — not a phrase from a song or book, which would be in attackers' phrase dictionaries.

For the relatively rare situations where you must create a password that a system forces to meet specific complexity requirements — must include uppercase, a symbol, a number, between 8 and 16 characters — the best approach is to start with a random passphrase fragment and apply required modifications: "Mango7!Tiger" satisfies typical complexity rules while being far stronger than the minimum required. Never let complexity requirements lead you toward predictable patterns; always prioritise length and randomness within whatever constraints exist.

  • Password manager generator: Best for all account passwords — truly random, any length, auto-filled, never needs memorising
  • Diceware passphrase: Four or more truly random words — long, memorable, excellent for master passwords
  • Manual random: Use a random word generator or physical dice if no manager is available — avoid mental patterns
  • Minimum 16 characters: Regardless of method, aim for 16+ characters for any new password
  • Test your password: Use tools like zxcvbn to evaluate strength — if it can be guessed in under 100 billion attempts, it is weak
  • Unique every time: No method for creating passwords is complete if you reuse the result anywhere
Passphrase vs password — detailed comparison →
Strong password creation methods illustration
4Putting It Into Practice

Implementing Strong Passwords Across All Your Accounts

The challenge most people face is not knowing how to create strong passwords — it is the transition from existing weak passwords to strong ones across dozens or hundreds of accounts. The key is to prioritise rather than trying to do everything at once. Start with your highest-risk accounts: primary email address (which can be used to reset all other passwords), banking and financial accounts, and primary social media accounts. Changing these five to ten accounts first provides an immediate, significant security improvement.

Use your password manager's security audit or password health dashboard to identify accounts with reused, weak, or compromised passwords. Bitwarden's Vault Health Reports, 1Password's Watchtower, and Dashlane's Password Health all provide prioritised lists of accounts that need attention. Work through these systematically, focusing on financial accounts, email, and any account linked to payment methods first. As you update each password, save the new strong password directly into your manager.

Going forward, the process becomes automatic: whenever you create a new account, use your password manager's generator to create a strong, unique password and save it immediately. Enable two-factor authentication on every account that supports it, particularly financial services, email, and social media. With a password manager handling generation and storage, the only ongoing discipline required is remembering your master password and keeping your 2FA backup codes in a secure location.

  • Prioritise high-risk accounts first: Email, banking, and social media — change these five to ten accounts immediately
  • Use the security dashboard: Let your manager identify weak, reused, and breached passwords automatically
  • Generate on account creation: Use the manager's generator every time you sign up for a new service
  • Enable 2FA everywhere: Strong passwords plus two-factor authentication provides robust account security
  • Store backup codes securely: Save 2FA recovery codes in your password manager's secure notes or a physical safe
  • Review annually: Run the security audit once a year to catch any newly breached or flagged passwords
Learn how a password manager makes this automatic →
Practical password security implementation

Start Creating Stronger Passwords Today

A password manager generates and stores strong, unique passwords for every account automatically — no memorisation required.

Related VPN Articles