KeyForge

Cryptographically strong passwords, generated entirely in your browser.

Web Crypto API · Zero network requests · No logs
Length 16
Include

Tip: Type or paste any password here to check its strength.

Strength
Entropy
Est. crack time (10B guesses/sec)

How to Use KeyForge

1
Choose a password type

Select one of the four tabs at the top: Random for maximum-entropy character strings, Passphrase for memorable word sequences, PIN for numeric codes, or Memorable for pronounceable passwords. Each type suits a different use case — pick the one that matches how the password will be used.

2
Adjust the settings

Use the length slider and character-type checkboxes to customise your password. For passphrases, pick the word count (5–8 words recommended) and a word separator. Changes apply immediately — a new password is generated on every adjustment, so you can explore options freely.

3
Read the strength meter

The Strength panel shows your password's entropy in bits and an estimated offline crack time. Aim for Strong or Very Strong (80+ bits) for any important account. The meter also works on passwords you type or paste manually — nothing is ever transmitted.

4
Click Generate, then Copy

Hit ↻ Generate Password to create a new password at any time, or press Enter anywhere on the page. Once you are happy with the result, click Copy and paste it directly into your password manager or account registration field.

5
Save it before you leave

KeyForge does not store anything — once you close or refresh the page, the password is gone. Always save it to a password manager (Bitwarden, KeePass, 1Password) before navigating away. Never screenshot a password or email it to yourself; neither channel is encrypted end-to-end.

What KeyForge Measures

KeyForge's strength meter gives you two numbers for every password: entropy in bits, which quantifies the size of the search space an attacker must cover, and an estimated crack time at 10 billion guesses per second — a realistic offline rate for a GPU cluster attacking a poorly hashed database. For Random, PIN, and Memorable passwords, entropy is calculated as length × log₂(charset size). For Passphrases it uses word count × log₂(wordlist size), which correctly models a word-based attack rather than a character-based one. The four password types each balance security and usability differently: Random maximises entropy density, Passphrase maximises memorability at the same entropy level, PIN is appropriate only where hardware enforces retry limits, and Memorable sits between the two for passwords that must occasionally be typed from memory.

Common Use Cases

How KeyForge Works

KeyForge generates passwords using window.crypto.getRandomValues() — the Web Cryptography API built into every modern browser. This is the same source of randomness your browser uses internally to create TLS session keys and cryptographic tokens. It is not the same as Math.random(), which is a pseudorandom number generator that produces predictable sequences if the seed is known.

The generation process is fully local. When you click Generate, your browser runs the JavaScript already loaded on the page — no data is sent to any server. You can confirm this yourself by opening your browser's Developer Tools (F12), navigating to the Network tab, and clicking Generate. You will see zero outgoing requests. The privotools infrastructure serves only the HTML, CSS, and JavaScript that runs the tool; it never receives or logs any password you create.

Clicking Generate populates the password field, which is also editable: type or paste any password to check its strength in real time. The strength meter uses entropy-based calculation — the same method security researchers use — rather than simple pattern-matching rules.

Why Strong Passwords Matter

Weak and reused passwords remain the single most common cause of account compromise. Here is why this matters in practice:

Who Uses This Tool

KeyForge is designed for anyone who needs a secure password and wants the assurance that their credentials are generated without touching a third-party server.

Tips & Best Practices

  1. Pair with a password manager. A strong password only protects you if you use it. Because KeyForge generates different random passwords each time, you need somewhere to store them. Bitwarden (open-source, free tier), KeePass (fully local), and 1Password are reliable options. Copy the generated password directly into your password manager before navigating away.
  2. Target entropy by account sensitivity. Use 60+ bits for standard accounts (roughly 10 random characters with full charset, or a 6-word passphrase). Use 80+ bits for email, banking, and your password manager master password. The strength meter on this page tells you exactly where you stand — aim for the "Strong" or "Very Strong" threshold for anything important.
  3. Use the Passphrase mode for master passwords. A 6-word passphrase gives around 54 bits of entropy and is something a human can memorize — critical for the one password you cannot store in a password manager (the manager's own master password). Avoid names, song lyrics, or famous quotes; use genuinely random words from this tool.
  4. Never email a generated password to yourself. Email is not encrypted in transit and is stored on servers outside your control. If you need to transfer a credential, use your password manager's secure sharing feature, or a tool designed for ephemeral secret sharing. Do not copy passwords into messaging apps, notes apps with cloud sync, or spreadsheets.
  5. Enable two-factor authentication (2FA). A strong password plus a TOTP app (Authy, Google Authenticator) or a hardware key (YubiKey) makes your account resistant to credential stuffing even if your password is somehow leaked. A strong password and 2FA together are dramatically more secure than either alone.

Reference: Entropy & Security Standards

Use these tables as a quick reference when deciding how much security you need for a given account or system.

Account / Use Case Recommended Entropy Example (Random) Example (Passphrase)
Device PIN (hardware-limited) 13 bits (4-digit) 4 digits
Low-sensitivity (forums, trials) 28–40 bits 6–8 chars, full charset 3–4 words
Standard accounts 60+ bits 10 chars, full charset 6 words
Email / banking 80+ bits 14+ chars, full charset 8 words
Password manager master 80+ bits, memorizableNot recommended 8 words
API keys / server secrets 128+ bits 22+ chars, full charset Not typical
Character Set Pool Size Bits per Character Length for 80 bits
Digits only (0–9) 10 3.32 bits 25 digits
Lowercase only (a–z) 26 4.70 bits 18 chars
Lower + Uppercase 52 5.70 bits 15 chars
Lower + Upper + Digits 62 5.95 bits 14 chars
Full charset (+ 32 symbols) 94 6.55 bits 13 chars

NIST SP 800-63B (2017) states that memorized secrets should be at least 8 characters and that complexity rules (mandatory uppercase, symbols) do not significantly increase security relative to length. NIST guidance now emphasizes length and randomness over composition rules.

Frequently Asked Questions

Is KeyForge free to use?

Yes. KeyForge is completely free with no subscription, sign-up, or hidden fees. The tool is part of privotools, supported by Google AdSense advertising.

Do generated passwords ever leave my browser?

No. Every password is generated entirely in your browser using the Web Crypto API. No network request is made during generation — you can verify this by opening your browser's Network tab while clicking Generate. The privotools servers only deliver the HTML, CSS, and JavaScript that runs the tool. They never see, receive, or store any password you create.

What algorithm does KeyForge use?

KeyForge uses window.crypto.getRandomValues(), the Web Cryptography API built into every modern browser. This provides cryptographically secure random bytes — the same source of randomness used by your browser for TLS session keys. It is not the same as Math.random(), which is unsuitable for security applications.

What is the difference between a random password and a passphrase?

A random password like x7!Kq#mP9Lv2 combines letters, numbers, and symbols into a compact, high-entropy string — excellent for use with a password manager. A passphrase like road-hunt-cool-meal-bold chains random common words with a separator — easier to type and memorize while still achieving strong entropy at 6 or more words.

What is a Memorable password and when should I use it?

A Memorable password is generated using an alternating consonant-vowel pattern (e.g., Mekilobu). It sounds like a made-up word — easier to hold in memory than a fully random string, but unlike a real word, it is not in any dictionary. Use it when you need to type a password from memory occasionally and prefer something pronounceable over a passphrase.

How does the strength meter calculate entropy?

For random, PIN, and memorable passwords, entropy is: length × log₂(charset size). For passphrases, entropy is: word count × log₂(wordlist size), which reflects the true difficulty of a word-based attack. The crack time assumes an offline brute-force attack at 10 billion guesses per second — a conservative baseline representing a high-end GPU cluster.

Can I check the strength of an existing password?

Yes. The password field is editable at any time. Type or paste any password into it and the strength meter updates instantly. Since all processing is local, your existing password never leaves your device.

What does the crack time estimate mean?

It estimates how long it would take to brute-force your password at 10 billion guesses per second — roughly the speed of a GPU cluster attacking a weakly hashed database (SHA-1 or MD5). Real-world times vary enormously by the hashing algorithm the service uses: bcrypt slows this to thousands of guesses/sec, making even moderate passwords very resistant. The estimate is a conservative planning baseline.

How many passphrase words do I need?

For standard accounts, 5 words gives around 45 bits — adequate for most purposes. For email, banking, or a password manager master password, use 6–7 words (54–63 bits) or more. NIST guidance and current security research both suggest targeting 80+ bits for high-value accounts, which requires approximately 8 words with this tool's wordlist.

Does KeyForge work offline?

Yes. Once the page has fully loaded, KeyForge continues to generate passwords even if your internet connection drops. All generation logic runs locally in your browser with no server dependency. You need a connection only for the initial page load.