Velohost Velohost

Security & Authentication

Password Strength Checker – Frequently Asked Questions

Authoritative, plain-English explanations of how password strength is measured using entropy, breach intelligence, pattern detection, attack modelling, and NIST SP 800-63 guidance.

What does the Password Strength Checker actually analyse?

The Password Strength Checker evaluates passwords using multiple independent signals, including entropy calculations, character composition, pattern detection, known breach intelligence, real-world attack modelling, and NIST SP 800-63 compliance checks. This provides a far more accurate assessment than simple length or character rules.

What is password entropy and why does it matter?

Entropy measures how unpredictable a password is. Higher entropy means more possible combinations an attacker must try, dramatically increasing the time required to crack the password. Entropy is calculated based on length and character diversity, but also adjusted for predictability caused by patterns or substitutions.

Is password length more important than complexity?

Length is one of the strongest contributors to password security, but it is not sufficient on its own. A long but predictable password can still be weak. Modern guidance, including NIST SP 800-63B, recommends prioritising length while also rejecting breached or predictable passwords.

What does character composition analysis check?

Composition analysis evaluates whether a password contains lowercase letters, uppercase letters, digits, and symbols. While NIST no longer mandates composition rules, their presence increases entropy and resistance to brute-force attacks.

What patterns does the tool detect?

The tool detects repeated characters, sequential patterns, keyboard walks, and common substitutions such as replacing letters with numbers. These patterns significantly reduce effective entropy and make passwords easier to guess using specialised attack techniques.

Why are substitutions like P@ssw0rd considered weak?

Attackers explicitly model common substitutions. Replacing letters with visually similar symbols or numbers does not meaningfully increase security and is often flagged as predictable behaviour in password cracking tools.

How does breach detection work?

Passwords are checked against known breach datasets using a privacy-preserving k-anonymity model provided by Have I Been Pwned. Only partial hashes are exchanged, ensuring the original password is never exposed or stored.

What is Have I Been Pwned and why is it used?

Have I Been Pwned is a widely trusted breach intelligence service that aggregates data from known breaches. Using it helps prevent users from reusing passwords that attackers already possess.

What attack models are simulated?

The tool simulates random brute-force attacks and dictionary-based attacks informed by known breach data. It estimates time-to-crack using realistic guesses-per-second values rather than theoretical limits.

What does “effectively uncrackable with current technology” mean?

This means that even with modern hardware and realistic attack models, the estimated time required to brute-force the password exceeds practical limits, often measured in many billions of years.

What is the overall risk score?

The overall risk combines entropy, breach exposure, detected patterns, and attack feasibility into a single classification. A password may have high entropy but still be high-risk if it has appeared in known breaches.

What is NIST SP 800-63 and why does it matter?

NIST SP 800-63 is a U.S. government standard defining digital identity and authentication security. It is widely adopted globally and emphasises length, breach checks, and usability over outdated complexity rules.

How does the tool evaluate NIST SP 800-63 compliance?

The tool checks minimum length requirements, verifies that the password has not appeared in known breaches, and confirms that no forbidden patterns are present. Composition rules are not required under NIST guidance.

What does the numeric score represent?

The score is a simplified ranking derived from the full analysis. It is useful for UI display but should always be interpreted alongside warnings, risk level, and attack estimates.

Are passwords stored or logged?

No. Passwords are analysed in memory only and are never stored, logged, or persisted in any form by Velohost.

Is this safe to use in production authentication systems?

Yes. The API is designed for signup validation, password changes, audits, and automated security enforcement. It is suitable for production use when combined with proper hashing and storage practices.

Does this replace password hashing?

No. This tool evaluates password strength before storage. Passwords must still be hashed using a secure algorithm such as Argon2, bcrypt, or scrypt before being stored.

Want to try it yourself? Password Strength Checker or Password Strength API

Ready to evaluate passwords using modern security standards?