brute force calculator

Password Brute Force Time Estimator

Use this calculator to estimate how long a brute force attack might take against a password. This is for security awareness and defensive planning.

Number of characters in the password.
Enabled only when “Custom Size” is selected.
Examples: 1e6, 1e9, 1e11 depending on hardware and hash type.
Total systems attacking at once.
Enter your assumptions and click Calculate.

Why a Brute Force Calculator Matters

A brute force calculator helps turn abstract password advice into concrete numbers. Instead of hearing “use a strong password,” you can estimate how long an attacker would need to test all possible combinations under different assumptions. That gives you a practical way to compare a short password against a long passphrase, or to see how much difference stronger hashing and slower verification can make.

The key takeaway: password security is mostly a math problem. Length and character variety increase the search space exponentially, while attacker speed and parallel hardware reduce cracking time. This tool brings both sides of that equation into one place.

How the Calculator Works

Core formulas

  • Search Space = (character set size)password length
  • Average tries = search space ÷ 2
  • Worst-case tries = search space
  • Effective guess rate = guesses/second × number of parallel rigs
  • Time (seconds) = tries needed ÷ effective guess rate
  • Entropy (bits) = password length × log2(character set size)

Entropy is a compact way to compare password strength across different lengths and character sets. Higher entropy means a much larger search space and dramatically longer brute force time.

Input Definitions and Practical Meaning

Password length

This is usually the most important variable. Adding one extra character multiplies the search space by the full character set size. For example, in an alphanumeric set (62 symbols), adding one character makes the attack roughly 62 times harder.

Character set size

Bigger sets create more possibilities per position. Numeric-only PINs are easier to brute force than mixed-character passwords. However, adding length often gives more benefit than adding complexity alone.

Guesses per second

Attack speed varies wildly based on context. Offline cracking against weak hashes can be extremely fast. Online login attacks are much slower due to rate limits, lockouts, CAPTCHA, and monitoring.

Average vs worst case

In average case, the password is found halfway through the space. Worst case assumes the correct value is tested last. Real outcomes vary, especially when attackers prioritize common patterns first.

Quick Interpretation Guide

Estimated Time Interpretation Action
Seconds to minutes Very weak against brute force Increase length immediately; avoid predictable patterns.
Hours to days Still vulnerable in many scenarios Use longer passphrase and unique password per account.
Months to years Reasonable baseline for many consumer cases Add MFA and keep passwords unique.
Centuries+ Strong against brute force assumptions Maintain hygiene: MFA, updates, and breach monitoring.

What This Calculator Does Not Model

  • Dictionary attacks and leaked-password lists
  • Human-generated patterns (e.g., “Summer2026!”)
  • Credential stuffing from reused passwords
  • Phishing, malware, or social engineering
  • Differences between hash algorithms (Argon2id, bcrypt, scrypt, PBKDF2) beyond your speed assumption

So even if brute force time looks long, weak operational security can still cause fast compromise.

Defensive Lessons You Can Apply Today

  • Prefer long passphrases: Length compounds security quickly.
  • Use a password manager: It enables long, random, unique passwords everywhere.
  • Enable MFA: It blocks many attacks even when a password leaks.
  • Store passwords with slow hashes: Argon2id/bcrypt/scrypt dramatically lower crack speed.
  • Apply rate limiting and lockout controls: Essential for online authentication endpoints.

Online vs Offline Attacks

Online attacks occur against a live login form and are usually slow due to controls. Offline attacks happen when an attacker steals password hashes and can test guesses locally at high speed. The difference is massive. A password that survives online attempts may still fail quickly offline if hashing is weak and the password is short.

Final Thoughts

Use this brute force calculator as a planning tool, not a guarantee. It is best for comparing scenarios: “How much safer is 14 characters than 10?” or “What happens if we move from weak hashing to memory-hard hashing?” In cybersecurity, better decisions come from better assumptions—and visible math helps teams make those decisions faster.

🔗 Related Calculators