Tip: Type or paste any password here to check its strength.
How to Use KeyForge
Select one of the four tabs at the top: Random for maximum-entropy character strings, Passphrase for memorable word sequences, PIN for numeric codes, or Memorable for pronounceable passwords. Each type suits a different use case — pick the one that matches how the password will be used.
Use the length slider and character-type checkboxes to customise your password. For passphrases, pick the word count (5–8 words recommended) and a word separator. Changes apply immediately — a new password is generated on every adjustment, so you can explore options freely.
The Strength panel shows your password's entropy in bits and an estimated offline crack time. Aim for Strong or Very Strong (80+ bits) for any important account. The meter also works on passwords you type or paste manually — nothing is ever transmitted.
Hit ↻ Generate Password to create a new password at any time, or press Enter anywhere on the page. Once you are happy with the result, click Copy and paste it directly into your password manager or account registration field.
KeyForge does not store anything — once you close or refresh the page, the password is gone. Always save it to a password manager (Bitwarden, KeePass, 1Password) before navigating away. Never screenshot a password or email it to yourself; neither channel is encrypted end-to-end.
What KeyForge Measures
KeyForge's strength meter gives you two numbers for every password: entropy in bits, which quantifies the size of the search space an attacker must cover, and an estimated crack time at 10 billion guesses per second — a realistic offline rate for a GPU cluster attacking a poorly hashed database. For Random, PIN, and Memorable passwords, entropy is calculated as length × log₂(charset size). For Passphrases it uses word count × log₂(wordlist size), which correctly models a word-based attack rather than a character-based one. The four password types each balance security and usability differently: Random maximises entropy density, Passphrase maximises memorability at the same entropy level, PIN is appropriate only where hardware enforces retry limits, and Memorable sits between the two for passwords that must occasionally be typed from memory.
Common Use Cases
- New account registration — Generate a 16-character Random password, copy it into your password manager, and use it for that account only. Unique passwords per account ensure that one breach does not cascade across your other logins.
- Password manager master password — Switch to Passphrase mode, set 7–8 words, and memorise the result. A passphrase like road-hunt-cool-meal-bold-wire reaches 54+ bits of entropy and is far easier to recall than a random character string — important for the one password you cannot store anywhere.
- API keys and server secrets — Use Random mode at 32+ characters with all character types enabled. Paste directly into your
.envfile or secrets manager. At 32 characters with the full charset, entropy exceeds 200 bits — effectively uncrackable by any known method. - Checking an existing password — Type or paste any password into the output field without clicking Generate. The strength meter updates in real time, showing its entropy and estimated crack time. Because all processing is local, nothing ever leaves your browser.
Want to go deeper? Read How to Choose a Strong Password and Passphrase vs. Password: Which Is Right for You? on the privotools blog.
How KeyForge Works
KeyForge generates passwords using window.crypto.getRandomValues() — the Web Cryptography API built into every modern browser. This is the same source of randomness your browser uses internally to create TLS session keys and cryptographic tokens. It is not the same as Math.random(), which is a pseudorandom number generator that produces predictable sequences if the seed is known.
The generation process is fully local. When you click Generate, your browser runs the JavaScript already loaded on the page — no data is sent to any server. You can confirm this yourself by opening your browser's Developer Tools (F12), navigating to the Network tab, and clicking Generate. You will see zero outgoing requests. The privotools infrastructure serves only the HTML, CSS, and JavaScript that runs the tool; it never receives or logs any password you create.
Clicking Generate populates the password field, which is also editable: type or paste any password to check its strength in real time. The strength meter uses entropy-based calculation — the same method security researchers use — rather than simple pattern-matching rules.
Why Strong Passwords Matter
Weak and reused passwords remain the single most common cause of account compromise. Here is why this matters in practice:
- Credential stuffing: When a service is breached, the stolen email/password combinations are immediately tested against banking sites, email providers, and social platforms using automated tools. If you reuse passwords, one breach becomes many.
- Brute-force speeds: A modern GPU cluster can test billions of passwords per second against a poorly protected database. An 8-character password using only lowercase letters has about 38 bits of entropy — at 10 billion guesses/sec, that falls in under a minute.
- Dictionary attacks: Most real-world attacks do not try random combinations — they start with wordlists of common passwords, names, and phrases, then add variations. "Password1!" is cracked instantly.
- Length beats complexity: A 20-character lowercase random string (94 bits of entropy) is exponentially stronger than an 8-character "complex" password with uppercase, numbers, and symbols (52 bits). Length matters more than special characters.
- Unique passwords per account: A strong password that you use on ten sites is weaker in practice than a moderate password used on only one site, because you are trusting all ten services to store it securely.
Who Uses This Tool
KeyForge is designed for anyone who needs a secure password and wants the assurance that their credentials are generated without touching a third-party server.
- Developers & DevOps engineers generating API keys, database credentials, environment variable secrets, and SSH passphrases that need to be truly random — not chosen by a human and not reused from another project.
- Students and young adults managing dozens of accounts across educational platforms, streaming services, and social networks, who want unique passwords for each without remembering them all (use a password manager alongside KeyForge).
- IT administrators creating temporary credentials for new employees, resetting service account passwords, and provisioning database users where a predictable or reused password could become a security incident.
- Content creators and social media managers who control access to multiple brand accounts across platforms and need strong, unique credentials for each — especially when sharing access with team members requires periodic rotation.
- Privacy-conscious users who specifically avoid cloud-based password tools, browser-integrated generators, or any service that could theoretically log or transmit the passwords it generates. KeyForge's zero-network-request design makes this verifiable.
- Non-technical users who find random character strings difficult to type. The Passphrase mode (e.g., road-hunt-cool-meal-bold) and Memorable mode (e.g., Mekilovu) produce passwords that are both cryptographically generated and easier to work with on a phone or physical keyboard.
Tips & Best Practices
- Pair with a password manager. A strong password only protects you if you use it. Because KeyForge generates different random passwords each time, you need somewhere to store them. Bitwarden (open-source, free tier), KeePass (fully local), and 1Password are reliable options. Copy the generated password directly into your password manager before navigating away.
- Target entropy by account sensitivity. Use 60+ bits for standard accounts (roughly 10 random characters with full charset, or a 6-word passphrase). Use 80+ bits for email, banking, and your password manager master password. The strength meter on this page tells you exactly where you stand — aim for the "Strong" or "Very Strong" threshold for anything important.
- Use the Passphrase mode for master passwords. A 6-word passphrase gives around 54 bits of entropy and is something a human can memorize — critical for the one password you cannot store in a password manager (the manager's own master password). Avoid names, song lyrics, or famous quotes; use genuinely random words from this tool.
- Never email a generated password to yourself. Email is not encrypted in transit and is stored on servers outside your control. If you need to transfer a credential, use your password manager's secure sharing feature, or a tool designed for ephemeral secret sharing. Do not copy passwords into messaging apps, notes apps with cloud sync, or spreadsheets.
- Enable two-factor authentication (2FA). A strong password plus a TOTP app (Authy, Google Authenticator) or a hardware key (YubiKey) makes your account resistant to credential stuffing even if your password is somehow leaked. A strong password and 2FA together are dramatically more secure than either alone.
Reference: Entropy & Security Standards
Use these tables as a quick reference when deciding how much security you need for a given account or system.
| Account / Use Case | Recommended Entropy | Example (Random) | Example (Passphrase) |
|---|---|---|---|
| Device PIN (hardware-limited) | 13 bits (4-digit) | 4 digits | — |
| Low-sensitivity (forums, trials) | 28–40 bits | 6–8 chars, full charset | 3–4 words |
| Standard accounts | 60+ bits | 10 chars, full charset | 6 words |
| Email / banking | 80+ bits | 14+ chars, full charset | 8 words |
| Password manager master | 80+ bits, memorizable | Not recommended | 8 words |
| API keys / server secrets | 128+ bits | 22+ chars, full charset | Not typical |
| Character Set | Pool Size | Bits per Character | Length for 80 bits |
|---|---|---|---|
| Digits only (0–9) | 10 | 3.32 bits | 25 digits |
| Lowercase only (a–z) | 26 | 4.70 bits | 18 chars |
| Lower + Uppercase | 52 | 5.70 bits | 15 chars |
| Lower + Upper + Digits | 62 | 5.95 bits | 14 chars |
| Full charset (+ 32 symbols) | 94 | 6.55 bits | 13 chars |
NIST SP 800-63B (2017) states that memorized secrets should be at least 8 characters and that complexity rules (mandatory uppercase, symbols) do not significantly increase security relative to length. NIST guidance now emphasizes length and randomness over composition rules.
Frequently Asked Questions
Is KeyForge free to use?
Yes. KeyForge is completely free with no subscription, sign-up, or hidden fees. The tool is part of privotools, supported by Google AdSense advertising.
Do generated passwords ever leave my browser?
No. Every password is generated entirely in your browser using the Web Crypto API. No network request is made during generation — you can verify this by opening your browser's Network tab while clicking Generate. The privotools servers only deliver the HTML, CSS, and JavaScript that runs the tool. They never see, receive, or store any password you create.
What algorithm does KeyForge use?
KeyForge uses window.crypto.getRandomValues(), the Web Cryptography API built into every modern browser. This provides cryptographically secure random bytes — the same source of randomness used by your browser for TLS session keys. It is not the same as Math.random(), which is unsuitable for security applications.
What is the difference between a random password and a passphrase?
A random password like x7!Kq#mP9Lv2 combines letters, numbers, and symbols into a compact, high-entropy string — excellent for use with a password manager. A passphrase like road-hunt-cool-meal-bold chains random common words with a separator — easier to type and memorize while still achieving strong entropy at 6 or more words.
What is a Memorable password and when should I use it?
A Memorable password is generated using an alternating consonant-vowel pattern (e.g., Mekilobu). It sounds like a made-up word — easier to hold in memory than a fully random string, but unlike a real word, it is not in any dictionary. Use it when you need to type a password from memory occasionally and prefer something pronounceable over a passphrase.
How does the strength meter calculate entropy?
For random, PIN, and memorable passwords, entropy is: length × log₂(charset size). For passphrases, entropy is: word count × log₂(wordlist size), which reflects the true difficulty of a word-based attack. The crack time assumes an offline brute-force attack at 10 billion guesses per second — a conservative baseline representing a high-end GPU cluster.
Can I check the strength of an existing password?
Yes. The password field is editable at any time. Type or paste any password into it and the strength meter updates instantly. Since all processing is local, your existing password never leaves your device.
What does the crack time estimate mean?
It estimates how long it would take to brute-force your password at 10 billion guesses per second — roughly the speed of a GPU cluster attacking a weakly hashed database (SHA-1 or MD5). Real-world times vary enormously by the hashing algorithm the service uses: bcrypt slows this to thousands of guesses/sec, making even moderate passwords very resistant. The estimate is a conservative planning baseline.
How many passphrase words do I need?
For standard accounts, 5 words gives around 45 bits — adequate for most purposes. For email, banking, or a password manager master password, use 6–7 words (54–63 bits) or more. NIST guidance and current security research both suggest targeting 80+ bits for high-value accounts, which requires approximately 8 words with this tool's wordlist.
Does KeyForge work offline?
Yes. Once the page has fully loaded, KeyForge continues to generate passwords even if your internet connection drops. All generation logic runs locally in your browser with no server dependency. You need a connection only for the initial page load.