Security

Password Security: Strong Passwords, NIST 2024 Guidelines, and Why Complexity Rules Backfire

13 min readBy KBC Grandcentral Research Team

81% of hacking-related data breaches involve stolen or weak passwords, according to Verizon's Data Breach Investigations Report. Yet the most common passwords are still '123456' and 'password'. Here's the actual science of what makes passwords secure — and it's not what most websites tell you.

10110101001011010010010010101101001011011101001011010100101100101101001011010010101101010010100101011011010010110Password Security 2025

Key Takeaways

  • Length beats complexity — a 16-character random string takes billions of years to crack; an 8-character "complex" password takes hours
  • NIST 2024 bans forced complexity rules — "P@ssw0rd" patterns are predictable and weak
  • Over 24 billion username/password combos circulate on the dark web
  • Password managers solve the reuse problem — only ~34% of people use one
  • A passphrase of 4+ random words is as secure as a complex 16-character password and far easier to remember

How Long Does It Take to Crack Your Password?

Modern password cracking uses graphics processing units (GPUs) that can evaluate billions of hash attempts per second. The Hive Systems Password Table — updated annually with current GPU capabilities — shows something striking: complexity rules don't save you, but length does.

Password Type8 Characters12 Characters16 Characters
Numbers onlyInstantlySecondsMinutes
Lowercase onlyInstantly3 weeks350 years
Upper + lower + numbers1 hour2 centuries2 trillion yrs
All character types8 hours34,000 yearsLonger than universe age

Source: Hive Systems Password Table (2024), benchmarked against modern GPU hash rates for bcrypt. Assumes random characters — dictionary words crack much faster regardless of length.

The takeaway is simple: a random 16-character password from any character set is effectively uncrackable by brute force. The danger isn't brute force — it's credential stuffing (using leaked passwords from other sites) and phishing.

NIST SP 800-63B 2024: The Official Guidelines (And They Changed Everything)

The National Institute of Standards and Technology (NIST) publishes the authoritative US federal password guidelines. The 2017 update and the 2024 final revision of SP 800-63B overturned decades of bad password advice. Here's what NIST now says:

✓ NIST Now Recommends

  • • Minimum 8 characters; systems should support up to 64
  • • Focus on LENGTH over complexity
  • • Passphrases of random words (e.g., "correct-horse-battery-staple")
  • • Check against known breached password lists
  • • Allow copy-paste in password fields
  • • Offer multi-factor authentication

✗ NIST Now Bans

  • • Forced complexity rules ("must include !@#$")
  • • Mandatory periodic password resets
  • • Password hints or security questions
  • • Blocking paste in password fields
  • • Arbitrary character restrictions
  • • SMS as the sole MFA option (weakened guidance)

Why ban complexity rules? Because they predictably produce patterns. When told to include a capital letter, a number, and a symbol, users reliably produce "Password1!" — one of the most-cracked passwords in breach databases. Complexity rules create the illusion of security while training users into predictable behaviors. Length is what actually matters.

The Dark Reality: Billions of Passwords Already Compromised

Over 24 billion username and password combinations circulate on dark web markets — a number that grows with every major data breach. HaveIBeenPwned (HIBP), run by security researcher Troy Hunt, has catalogued over 12 billion individual accounts from data breaches. The site allows anyone to check if their email address appears in known breach data.

The Most Common Passwords (Still, in 2024)

123456
password
123456789
qwerty
12345
iloveyou
111111
abc123

Source: NordPass Most Common Passwords Report 2024. These appear in hundreds of millions of breach records.

The attack that compromises most accounts isn't brute-force cracking — it's credential stuffing: taking leaked username/password pairs from one site and automatically trying them on thousands of other sites. If you use the same password on multiple services, one breach compromises all of them.

Password Managers: The Actual Solution

The human brain cannot memorize dozens of genuinely strong, unique passwords. Password managers solve this by generating random passwords for every site, storing them in an encrypted vault, and auto-filling them. You only need to remember one strong master password.

Despite security professionals unanimously recommending them for a decade, only about 34% of people regularly use a password manager. The gap between knowing about them and using them is partly friction and partly unfamiliarity.

ManagerOpen SourceFree TierBest For
BitwardenYesGenerousMost users — great free tier
1PasswordNoNoFamilies and teams
DashlaneNoLimitedDark web monitoring
KeePassXCYes100% freePrivacy-first / local storage

Generate Strong Passwords Instantly

Use our free Password Generator to create cryptographically random passwords of any length and complexity. For maximum security with memorability, try a four-word passphrase — "correct-horse-battery-staple" style passphrases are both long (high entropy) and memorable.

Generate a Secure Password

Create random passwords up to 64 characters with customizable character sets — instantly, with no storage or tracking.

Open Password Generator →