This is a java port of zxcvbn, which is a password strength estimator inspired by password crackers written on JavaScript.
Through pattern matching and conservative estimation, it recognizes and weighs 30k common passwords, common names and surnames according to US census data, popular English words from Wikipedia and US television and movies, and other common patterns like dates, repeats (aaa
), sequences (abcd
), keyboard patterns (qwertyuiop
), and l33t speak.
The following version is a port of zxcvbn 4.4.2
- 2021/03/22 1.4.1 released.
- 2021/02/19 1.4.0 released.
- 2021/02/09 1.3.6 released.
- 2021/02/02 1.3.5 released.
- 2021/01/26 1.3.4 released.
- 2021/01/21 1.3.3 released.
- 2021/01/19 1.3.2 released.
- 2020/10/28 1.3.1 released.
- 2019/10/19 1.3.0 released.
- 2019/07/23 1.2.7 released.
- 2019/07/16 1.2.6 released.
- 2018/03/30 1.2.5 released.
- 2018/02/27 1.2.4 released.
- 2017/03/27 1.2.3 released.
The following version is a port of zxcvbn 4.4.1
- 2016/12/07 1.2.2 released.
- 2016/12/03 1.2.1 released.
The following version is a port of zxcvbn 4.4.0
- 2016/10/29 1.2.0 released.
The following version is a port of zxcvbn 4.3.0
- 2016/10/01 1.1.6 released.
- 2016/09/27 1.1.5 released.
- 2016/07/08 1.1.4 released.
- 2016/05/27 1.1.3 released.
- 2016/05/25 1.1.2 released.
- 2016/03/19 1.1.1 released.
- 2016/03/06 1.1.0 released.
The following version is a port of zxcvbn 4.2.0
- 2016/01/28 1.0.2 released.
- 2016/01/27 1.0.1 released.
- 2015/12/24 1.0.0 released.
- It includes JIS keyboard layout in spatial matching.
- Localization feedback messages.
- Password args accept CharSequence as well as String.
- This gives a lot more flexibility in what format the password can be in.
- Also attempts to avoid using Strings for any sensitive intermediate objects.
compile 'com.nulab-inc:zxcvbn:1.4.1'
<dependency>
<groupId>com.nulab-inc</groupId>
<artifactId>zxcvbn</artifactId>
<version>1.4.1</version>
</dependency>
To build:
$ git clone git@github.com:nulab/zxcvbn4j.git
$ cd zxcvbn4j/
$ ./gradlew build
Basic Usage. This is also available Android.
Zxcvbn zxcvbn = new Zxcvbn();
Strength strength = zxcvbn.measure("This is password");
If you want to add your own dictionary, put the keyword list of List type to the second argument.
List<String> sanitizedInputs = new ArrayList();
sanitizedInputs.add("nulab");
sanitizedInputs.add("backlog");
sanitizedInputs.add("cacoo");
sanitizedInputs.add("typetalk");
Zxcvbn zxcvbn = new Zxcvbn();
Strength strength = zxcvbn.measure("This is password", sanitizedInputs);
The return result is "Strength". It's almost the same as zxcvbn.
# estimated guesses needed to crack password
strength.guesses
# order of magnitude of strength.guesses
strength.guessesLog10
# dictionary of back-of-the-envelope crack time
# estimations, in seconds, based on a few scenarios
strength.crackTimeSeconds
{
# online attack on a service that ratelimits password auth attempts.
onlineThrottling100PerHour
# online attack on a service that doesn't ratelimit,
# or where an attacker has outsmarted ratelimiting.
onlineNoThrottling10PerSecond
# offline attack. assumes multiple attackers,
# proper user-unique salting, and a slow hash function
# w/ moderate work factor, such as bcrypt, scrypt, PBKDF2.
offlineSlowHashing1e4PerSecond
# offline attack with user-unique salting but a fast hash
# function like SHA-1, SHA-256 or MD5. A wide range of
# reasonable numbers anywhere from one billion - one trillion
# guesses per second, depending on number of cores and machines.
# ballparking at 10B/sec.
offlineFastHashing1e10PerSecond
}
# same keys as result.crack_time_seconds,
# with friendlier display string values:
# "less than a second", "3 hours", "centuries", etc.
strength.crackTimeDisplay
# Integer from 0-4 (useful for implementing a strength bar)
# 0 Weak (guesses < ^ 3 10)
# 1 Fair (guesses <^ 6 10)
# 2 Good (guesses <^ 8 10)
# 3 Strong (guesses < 10 ^ 10)
# 4 Very strong (guesses >= 10 ^ 10)
strength.score
# verbal feedback to help choose better passwords. set when score <= 2.
strength.feedback
{
# explains what's wrong, eg. 'this is a top-10 common password'.
# not always set -- sometimes an empty string
warning
# a possibly-empty list of suggestions to help choose a less
# guessable password. eg. 'Add another word or two'
suggestions
}
# the list of patterns that zxcvbn based the guess calculation on.
strength.sequence
# how long it took zxcvbn to calculate an answer, in milliseconds.
strength.calc_time
The zxcvbn4j can be localized localize the english feedback message to other languages.
// Get the Strength instance.
Zxcvbn zxcvbn = new Zxcvbn();
Strength strength = zxcvbn.measure("This is password");
// Get the ResourceBundle based on the name and locale of the property file(※).
ResourceBundle resourceBundle = ResourceBundle.getBundle("This is bundle name", Locale.JAPAN);
// Feedback to pass the ResourceBundle. And to generate a localized Feedback.
Feedback feedback = strength.getFeedback();
Feedback localizedFeedback = feedback.withResourceBundle(resourceBundle);
// getSuggestions() and getWarning() returns localized feedback message.
List<String> localizedSuggestions = localizedFeedback.getSuggestions();
String localizedWarning = localizedFeedback.getWarning();
Defined Key and the message in the properties file. Reference the messages.properties.
Supported languages by default:
For bugs, questions and discussions please use the Github Issues.
MIT License
- Java 1.7+
- Maven
- Gradle 5.5+