Security Architecture · Analysis Engine · Privacy Model
PassSec evaluates every password through four independent security layers: a regex-based analysis engine, a Shannon entropy calculator, a RockYou dictionary lookup, and a k-anonymity breach check via HaveIBeenPwned. No password is ever stored or transmitted in plaintext.
Every password is evaluated against 10 regex-based criteria in under 1ms. Each criterion contributes to the final score (0–100) and triggers targeted improvement suggestions. Penalties are applied for detected patterns that significantly reduce real-world security.
Entropy measures how unpredictable a password is, expressed in bits. The higher the entropy, the longer a brute-force attack takes — even with a GPU running at 164 billion hashes per second (RTX 4090 speed). PassSec uses the theoretical maximum formula based on alphabet size and password length.
PassSec checks every password against the HaveIBeenPwned breach database — which contains over 800 million leaked password hashes — without ever sending your actual password or its full hash to any server. This is possible thanks to the k-anonymity model.
PassSec applies four independent security layers in every analysis. Each layer can independently flag a password as COMPROMISED, regardless of what the other layers report. All checks are performed server-side in a single POST request.
Ten regex-based criteria evaluate the password's structural complexity. Results are weighted and summed into a score from 0 to 100. Penalties reduce the score for anti-patterns.
Shannon entropy (E = L × log₂A) quantifies the password's theoretical resistance to brute-force attacks. PassSec translates entropy bits into estimated crack time using RTX 4090 benchmark speeds.
The password is checked against a list of the most common passwords derived from the RockYou data breach — the industry standard dictionary for password auditing. A match forces COMPROMISED status.
Real-time check against the HaveIBeenPwned breach database containing 800M+ hashed passwords. Only 5 SHA-1 prefix characters are transmitted — your password is never exposed externally.