๐Ÿ”’ Complex passwords are a waste of time

Aug 18, 2025ยท
Ian McCloy
Ian McCloy
ยท 3 min read
Passwords in Space

The Power of Passphrases: A Better Approach to Password Security

The conventional advice for passwords to use a complex string of random characters, but this is nonsense! Unreadable random characters will cause people to use short passwords like P@55w0rd!, or even worse write them down on a sicky note attached to the monitor.

The strength of a password is measured in bits of entropy, which quantifies the randomness and unpredictability of the password.

Which is the stronger password ?

g72$l#pT9a or ..COW……………….

The longer password, even one using a smaller character set, can provide significantly more entropy than a short, complex one. This is because the entropy calculation is exponential, with password length having a greater impact than character set size. This is a silly example and using a single dictionary word such as COW isn’t reccomended.

An actual effective and memorable approach to password creation is to use a long passphrase composed of multiple random words, ideally separated by special characters. Many password managers will be able to auto generate these for you.

The following table demonstrates how a long passphrase can provide more security than a standard complex password, based on a simple entropy calculation. It’s calculated using the formula E = logโ‚‚(RL), where E is the entropy in bits, R is the size of the character set, and L is the length of the password.

Let’s say a password uses lowercase letters (R=26) and has a length of 8 (L=8):

Possible combinations: 26^8 = 208,827,064,576

Entropy: logโ‚‚(26^8) โ‰ˆ 37.6 bits

Password ExampleLengthCharacter SetBits of Entropy
P@55w0rd!982 (upper, lower, digit, special)~57 bits
g72$l#pT9a1082 (upper, lower, digit, special)~64 bits
..COW………………..2549 (upper, special)~140 bits
correct-horse-battery-staple2837 (lower, digit, hyphen)~145 bits
4Turtles!all^the^way^down2582 (upper, lower, digit, special)~160 bits

A massive offline cracking cluster (assuming one hundred trillion guesses per second) would take 1 week to bruteforce crack g72$l#pT9a vs 6 hundred million trillion centuries to crack ..COW………………..

There are instances where a strong password is required, such as for a password manager’s master password. The truth is, passwords don’t matter as much as most people think.

The major cyberattacks that we read about in the media are not caused by brute force attacking passwords, but about stealing them for direct access to accounts. So no matter what password complexity rules you follow, it doesn’t matter. It’s still important to use unique passwords, but instead of focusing on creating the perfect password, we should be focusing on using multi-factor authentication (MFA) and ensuring that great threat detection is in-place to truly protect our accounts.

Microsoft research, based on actual threats to their massive Azure cloud architecture, explains this concept really well in their blog post Your Pa$$word doesn’t matter

It’s also worth mentioning that the newer FIDO passkey technology, which has been adopted by major tech players, builds in MFA, can be used in a passwordless model, and is far far more secure than using passwords.

Ian McCloy
Authors
Product Manager - Database Security
Ian lives in the United Kingdom with his wife and 2 kids. Ian is a Product Manager at Neo4j with a focus on cybersecurity but he has a vast range of experience as a Software Engineer, Technical Support Engineer, Quality Assurance Engineer and Systems Administrator. Ian has led global technical teams for the majority of his 25 year professional career and holds several patents in the areas of cybersecurity, virtualisation and server hardware design. The views expressed in this post are his own and do not reflect the views of his employer.