Password Length and Security — Choosing the Right Length

Password length is the single most important factor in password security. Short passwords fall to brute-force attacks in seconds, while each additional character increases cracking difficulty exponentially. This guide covers NIST recommendations, cracking time estimates, and practical strategies for strong passwords.

NIST Guidelines

NIST's SP 800-63B (revised 2017) fundamentally changed password best practices. Mandatory periodic changes and complex character requirements are now discouraged. Instead, sufficient length is the primary recommendation:

Length vs. Cracking Time

LengthCombinations (~95 char set)Estimated Cracking Time
6 chars~735 billionSeconds to minutes
8 chars~6.6 quadrillionHours to days
10 chars~6 × 1019Years to decades
12 chars~5.4 × 1023Tens of thousands of years
16 chars~4.4 × 1031Trillions of years

Modern GPUs can crack 8-character passwords in an estimated 5 hours. Moving to 12+ characters makes brute-force attacks computationally infeasible.

Passphrases

Passphrases combine multiple random words into a long, memorable password. Example: "correct horse battery staple" (28 characters). Use 4–5 unrelated words, optionally separated by spaces or symbols. The Diceware method (rolling dice to select from a 7,776-word list) generates passphrases with approximately 77+ bits of entropy.

Service Password Limits

ServiceMinimumMaximum
Google8100
Apple ID8No limit
Microsoft8256
Amazon6128
X (Twitter)8128
Banking (typical)816–32

Common Mistakes

Pro Tips

Conclusion

Use at least 12 characters, preferably 16+. Passphrases and password managers make long passwords practical. Check your password length with Character Counter.