Security

Password Generator

Generate strong, random passwords, memorable passphrases, and PINs. Entirely in your browser — nothing is sent to any server.

Quick Answer

A strong password should be at least 12-16 characters and include uppercase letters, lowercase letters, numbers, and symbols. A 16-character random password with all character types has approximately 95^16 (about 4.4 × 10^31) possible combinations, making brute-force attacks impractical. Passphrases of 4-5 random words (e.g., "correct-horse-battery-staple") offer comparable security with better memorability.

Click Generate
16
8128

Privacy first. Passwords are generated entirely in your browser using the Web Crypto API. Nothing is sent to any server, stored, or logged. Close this tab and your passwords exist only where you saved them.

About This Tool

The Password Generator creates strong, random passwords using cryptographically secure randomness from your browser's Web Crypto API. Unlike many online generators that rely on JavaScript's built-in Math.random() (which is not cryptographically secure), this tool uses crypto.getRandomValues()— the same source of entropy used for TLS connections and digital signatures. The result is genuinely unpredictable passwords suitable for protecting sensitive accounts.

Security researchers and organizations like NIST (National Institute of Standards and Technology) emphasize that password length matters more than complexity. Their SP 800-63B guidelines recommend allowing long passwords (up to at least 64 characters), not forcing arbitrary complexity rules, and checking passwords against known breach databases. This tool supports lengths from 8 to 128 characters, giving you full control over the length-vs-memorability tradeoff.

The Passphrasemode generates memorable multi-word passwords like “maple-torch-quest-bloom”. Passphrases are popular because they combine high entropy with human readability — you can actually remember them without writing them down. A 5-word passphrase from our 250+ word list provides approximately 40 bits of entropy, and a 6-word passphrase reaches approximately 48 bits. For maximum security, use 6+ words or combine a passphrase with a password manager.

Common password mistakes include reusing passwords across sites, using personal information (birthdays, pet names), using short passwords under 12 characters, and using predictable patterns like “Password1!”. A strong, unique password for every account is your best defense. Pair generated passwords with a reputable password manager so you only need to remember one master password. Enable two-factor authentication wherever available for an additional layer of security.

Frequently Asked Questions

How is password strength measured?
Password strength is measured in bits of entropy. Entropy quantifies how many guesses an attacker would need to crack the password by brute force. It is calculated as: length × log2(charset size). A 16-character password using uppercase, lowercase, numbers, and symbols (~95 characters) has about 105 bits of entropy, which is considered very strong.
Why is length more important than complexity?
Each additional character multiplies the number of possible combinations exponentially. Adding one character to a 95-character charset increases possibilities by 95×, while switching from lowercase-only to lowercase+numbers only increases the per-character pool from 26 to 36. A 20-character lowercase password (20 × 4.7 = 94 bits) is stronger than an 8-character password with all character types (8 × 6.6 = 52 bits). NIST SP 800-63B recommends prioritizing length.
What is a passphrase and why should I use one?
A passphrase is a password made of several random words, like "maple-torch-quest-bloom". Passphrases are easier to remember than random character strings but can be just as secure. A 4-word passphrase from a 250-word list has about 32 bits of entropy; a 5-word passphrase has about 40 bits. For high-security use, choose 6 or more words. Our generator uses a curated list of 250+ common English words.
Are these passwords generated securely?
Yes. This tool uses the Web Crypto API (crypto.getRandomValues) which provides cryptographically secure random numbers generated by your operating system's random number generator. This is the same source of randomness used by browsers for TLS/SSL connections. No passwords are transmitted over the network or stored anywhere.
What are NIST password guidelines?
NIST Special Publication 800-63B (Digital Identity Guidelines) recommends: allow at least 64 characters, do not require special complexity rules, do not force periodic password changes, screen passwords against known breached lists, and use multi-factor authentication. The key takeaway: longer passwords are better, and forced complexity (requiring symbols, mixed case) does not help as much as people think.