Data Breach Checker (Password Exposure)
Advanced forensic password analysis tool. Checks Global Breach Databases (HIBP) via k-Anonymity and calculates cryptographic entropy, brute-force costs, and pattern weaknesses.
About
This is not just a checker; it is a forensic instrument for your credentials. In an era where billions of passwords are leaked annually, knowing if yours is on a list is the baseline. Understanding why it is secure (or vulnerable) is the next level of defense. This tool employs Zero-Knowledge k-Anonymity to cross-reference your password against over 800 million exposed records without ever sending your actual password over the internet.
Simultaneously, the local engine performs a cryptographic autopsy on your input. It calculates Shannon Entropy (measured in bits), detects human behavioral patterns (like keyboard walks or dates), and simulates an attack by a modern GPU cluster. The result is a precise estimation of the financial and temporal cost required to crack your key.
Formulas
The core metric of password strength is Information Entropy (E), which defines the size of the keyspace the attacker must search.
Where L is the length and R is the pool of unique characters used. The time to crack (T) is calculated probabilistically (average 50% search space):
Reference Data
| Attacker Profile | Hash Rate (guesses/sec) | Threat Context |
|---|---|---|
| Script Kiddie (Laptop) | 10 MH/s | Generic malware, opportunistic attacks. |
| Professional Hacker (RTX 4090) | 100 GH/s | Targeted attacks on individuals. |
| Mining Farm (100x GPUs) | 10 TH/s | Industrial espionage, ransomware gangs. |
| State Actor (Supercomputer) | 100 PH/s | National security threats, high-value targets. |
Note: Rates are based on SHA-1/MD5 benchmarks. Slow hashing functions (Bcrypt/Argon2) significantly reduce these rates.