bjeavons / zxcvbn-php
Realistic password strength estimation PHP library based on Zxcvbn JS
Installs: 10 732 918
Dependents: 62
Suggesters: 7
Security: 0
Stars: 833
Watchers: 26
Forks: 113
Open Issues: 27
Requires
- php: ^7.2 | ^8.0 | ^8.1
- ext-json: *
- symfony/polyfill-mbstring: >=1.3.1
Requires (Dev)
Suggests
- ext-gmp: Required for optimized binomial calculations (also requires PHP >= 7.3)
This package is auto-updated.
Last update: 2024-12-21 22:33:31 UTC
README
Zxcvbn-PHP is a password strength estimator using pattern matching and minimum entropy calculation. Zxcvbn-PHP is based on the the Javascript zxcvbn project from Dropbox and @lowe. "zxcvbn" is bad password, just like "qwerty" and "123456".
zxcvbn attempts to give sound password advice through pattern matching and conservative entropy calculations. It finds 10k common passwords, common American names and surnames, common English words, and common patterns like dates, repeats (aaa), sequences (abcd), and QWERTY patterns.
Installation
The library can be installed with Composer by adding it as a dependency to your composer.json file.
Via the command line run:
composer require bjeavons/zxcvbn-php
Or in your composer.json add
{ "require": { "bjeavons/zxcvbn-php": "^1.0" } }
Then run composer update
on the command line and include the
autoloader in your PHP scripts so that the ZxcvbnPhp class is available.
require_once 'vendor/autoload.php';
Usage
use ZxcvbnPhp\Zxcvbn; $userData = [ 'Marco', 'marco@example.com' ]; $zxcvbn = new Zxcvbn(); $weak = $zxcvbn->passwordStrength('password', $userData); echo $weak['score']; // will print 0 $strong = $zxcvbn->passwordStrength('correct horse battery staple'); echo $strong['score']; // will print 4 echo $weak['feedback']['warning']; // will print user-facing feedback on the password, set only when score <= 2 // $weak['feedback']['suggestions'] may contain user-facing suggestions to improve the score
Scores are integers from 0 to 4:
- 0 means the password is extremely guessable (within 10^3 guesses), dictionary words like 'password' or 'mother' score a 0
- 1 is still very guessable (guesses < 10^6), an extra character on a dictionary word can score a 1
- 2 is somewhat guessable (guesses < 10^8), provides some protection from unthrottled online attacks
- 3 is safely unguessable (guesses < 10^10), offers moderate protection from offline slow-hash scenario
- 4 is very unguessable (guesses >= 10^10) and provides strong protection from offline slow-hash scenario
Acknowledgements
Thanks to:
- @lowe for the original Javascript Zxcvbn
- @Dreyer's port for reference for initial implementation
- @mkopinsky for major updates to keep in sync with upstream scoring