About MyPasswordChecker.com
Your privacy-focused password security toolkit with quantum resistance analysis
Who We Are
MyPasswordChecker.com is operated by All Aligned Consulting LLC, a California-based company specializing in cybersecurity tools and education.
We're committed to making password security accessible, transparent, and privacy-focused. Our tools are designed with the principle that your sensitive data should never leave your control unless absolutely necessary.
Open Source & Transparency
We believe in transparency. Our core password strength checker is open source on GitHub, allowing security researchers and developers to verify our claims and contribute improvements.
For responsible disclosure of security vulnerabilities, please contact: security@mypasswordchecker.com
What We Do
MyPasswordChecker.com is a free, privacy-first password strength analysis tool that helps you understand how secure your passwords are against both classical and quantum computing attacks. All password analysis happens directly in your browser - we never see or store your passwords.
๐ Free Password Analysis
Instant strength scoring, entropy calculation, crack time estimation, and pattern detection - all running locally in your browser for complete privacy.
โ๏ธ Quantum Resistance Estimates
See theoretical crack times against quantum computers using Grover's algorithm. Understand how your passwords hold up in a post-quantum world.
โจ Phonetic Password Generator
Transform memorable phrases into quantum-resistant passwords. Create strong passwords you can actually remember using phonetic substitution.
๐ง Developer API
Integrate password strength checking into your applications with our RESTful API. Free tier includes 25 requests per month.
Frequently Asked Questions
zxcvbn library from Dropbox to analyze password strength directly in your browser. Your password is never transmitted to our servers, never logged, and never stored anywhere.
- Entropy Estimation: Measures the unpredictability of your password based on character diversity and length
- Dictionary Checks: Tests against common password dictionaries and known weak patterns
- Pattern Recognition: Detects sequences like "123456", "qwerty", keyboard patterns, and repeated characters
- Crack Time Calculation: Estimates how long it would take to crack using modern GPU hardware (billions of attempts per second)
- Pessimistic: Early quantum computers (2025-2030) with limited capabilities
- Plausible: Near-term quantum systems (2030-2040) with moderate power
- Optimistic: Mature quantum computers (2040+) with high iteration rates
- Enter a memorable phrase (e.g., "I love hiking in Yosemite")
- Choose memorability level (easy, medium, or maximum security)
- The generator creates 5 unique variations using:
- Phonetic substitutions (aโ@, eโ3, iโ1, oโ0)
- Random capitalization patterns
- Special character separators
- Entropy boosting to reach quantum-resistant levels (80+ bits)
- Length: At least 12-16 characters (longer is better)
- Character Diversity: Mix of uppercase, lowercase, numbers, and symbols
- No Common Patterns: Avoid "password123", "qwerty", birthdays, names
- High Entropy: 60+ bits for classical resistance, 80+ bits for quantum resistance
- Uniqueness: Different password for each account
- Not Previously Breached: Check against known breach databases
- Most users: Current best practices (12+ character passwords with good entropy) are sufficient for now. Quantum computers powerful enough to break passwords don't exist yet.
- Long-term security: If you're protecting data that needs to remain secure for 10+ years (financial records, medical data, legal documents), quantum resistance is worth considering.
- Forward thinking: Using quantum-resistant passwords (80+ bits of entropy) now means you won't need to change them later when quantum threats emerge.
- Best practice: Use multi-factor authentication (MFA) in addition to strong passwords. MFA provides strong protection even if passwords are compromised.
| Feature | MyPasswordChecker.com | Most Other Tools |
|---|---|---|
| Privacy | 100% Client-Side | Sends to Server |
| Quantum Estimates | Yes (3 scenarios) | No |
| Password Generator | Phonetic (memorable) | Random only |
| Developer API | Yes (Free tier) | Varies |
| Cost | Free + Paid API | Varies |
Examples:
- 20 bits: Very weak - could be cracked in seconds (e.g., "password")
- 40 bits: Weak - could be cracked in hours to days (e.g., "Password123")
- 60 bits: Good - would take months to years with GPUs (e.g., "MyP@ssw0rd2024!")
- 80 bits: Excellent - quantum resistant, would take years even for quantum computers (e.g., "C0rr3ct-H0rs3-B@tt3ry-St@pl3!")
Why it matters: Entropy directly correlates to crack time. Higher entropy = exponentially harder to crack.
- Free Plan: 25 password checks per month - perfect for testing and small projects
- Standard Plan ($19/mo): 12,000 password checks + 100 quantum estimates per month
- Quantum Plan ($49/mo): 25,000 password checks + 5,000 quantum estimates per month
- Client-side processing: Both tools run entirely in your browser after payment, so there's no ongoing server cost
- 24-hour access window: Pay $1 for unlimited use of both tools for 24 hours from payment
- Educational tool: We want quantum security education to be accessible to everyone
- Covers payment processing: The $1 helps cover Stripe transaction fees
๐ก Tips for Creating Strong Passwords
- โ Use at least 12-16 characters - Length is one of the most important factors
- โ Include uppercase, lowercase, numbers, and symbols - Character diversity increases entropy
- โ Use passphrases - Four random words (e.g., "Correct-Horse-Battery-Staple") are easier to remember and very strong
- โ Use our phonetic generator - Turn memorable phrases into quantum-resistant passwords
- โ Use a password manager - Let software generate and store complex passwords for you (1Password, Bitwarden, Keeper)
- โ Enable multi-factor authentication (MFA) - Adds critical second layer of security
- โ Use unique passwords for each account - Prevents credential stuffing attacks
- โ Avoid common patterns - No "password123", "qwerty", "abc123", etc.
- โ Don't use personal information - No birthdays, names, addresses, phone numbers
- โ Don't reuse passwords - One breach compromises all accounts with same password
- โ Don't share passwords - Use secure sharing features in password managers if needed
๐ฌ How Password Testing Works
Password testing uses multiple techniques to evaluate strength:
1. Entropy Estimation
Calculates the average unpredictability of your password based on character set size and length. For example, an 8-character password using uppercase, lowercase, numbers, and symbols could have ~52-64 bits of entropy if truly random.
2. Dictionary & Pattern Checks
Passwords are tested against common password dictionaries and pattern recognition algorithms. This catches passwords like "password123", "qwerty", keyboard patterns (like "asdfgh"), and simple substitutions (like "P@ssw0rd").
3. Crack Time Calculation
Based on entropy and patterns, we estimate how long it would take to crack your password using:
- Classical attacks: Modern GPU farms (10ยนยฒ guesses/second)
- Quantum attacks: Grover's algorithm with varying quantum computer capabilities
4. Grover's Algorithm (Quantum)
Grover's algorithm provides a quadratic speedup for brute-force search. This means:
- Classical: Search through N possibilities โ takes N steps
- Quantum: Search through N possibilities โ takes โN steps
- Result: A password with 80 bits of classical security has ~40 bits of quantum security
๐ Additional Resources
๐ Free Password Checker
Test your password strength instantly with our free tool on the homepage.
Try Free Checkerโ๏ธ Premium Tools ($1)
Get 24-hour access to quantum analysis and phonetic password generator for $1.
Upgrade to Premium๐ง Developer API
Integrate password checking into your application with our RESTful API.
Get API KeyStill have questions?
Check out our Documentation for technical details, visit the Developer Dashboard to get started with the API, or review our Privacy Policy and Terms of Service.
๐ Our Domains
MyPasswordChecker.com is accessible through multiple domains. All alternate domains automatically redirect to our main domain:
All domains are secured with HTTPS and automatically redirect to mypasswordchecker.com for a consistent experience.