A password is considered strong if the below conditions are all met:
6
characters and at most 20
characters."Baaabb0"
is weak, but "Baaba0"
is strong).Given a string password
, return the minimum number of steps required to make password
strong. if password
is already strong, return 0
.
In one step, you can:
password
,password
, orpassword
with another character.
Example 1:
Input: password = "a" Output: 5
Example 2:
Input: password = "aA1" Output: 3
Example 3:
Input: password = "1337C0d3" Output: 0
Constraints:
1 <= password.length <= 50
password
consists of letters, digits, dot '.'
or exclamation mark '!'
.This problem requires determining the minimum number of steps to transform a given password into a strong password. A strong password adheres to these rules:
The solution employs a greedy approach, handling different scenarios based on password length:
1. Password Length Less Than 6:
6 - n
).3 - types
).2. Password Length Between 6 and 20:
replace
.3 - types
) is also calculated.3. Password Length Greater Than 20:
This is the most complex case. The strategy is to reduce the password length to 20 while minimizing the changes required to meet the other criteria.
The number of characters to remove (remove = n - 20
) is determined.
The code iterates and identifies groups of repeating characters, similar to the previous case, calculating replace
. Crucially, it prioritizes removing characters from repeating sequences of length greater than or equal to 3 to optimize the number of replacements needed. It keeps track of whether removing characters from sequences of length 3, 4, or 5 would be more efficient.
A sequence of length 3 can be reduced to length 2 using one removal; length 4 can be reduced to length 2 using two removals (or 3 using 1 removal and 1 replacement), and length 5 can be reduced using three removals (or 4 using 2 removals and 1 replacement). The code tries to make efficient use of the removals.
Finally, the code calculates the total number of steps as the sum of characters to remove, plus the remaining replacements required, and the missing character types, taking the maximum of the last two.
Time Complexity Analysis:
The solution iterates through the password string once in each case. Therefore, the time complexity is O(n), where n is the length of the password.
Space Complexity Analysis:
The space complexity is O(1) because the solution uses only a constant amount of extra space to store variables regardless of the input size.
The provided code in Python, Java, and C++ implements this approach effectively. The core logic remains the same across all three languages; only the syntax and library functions differ slightly. Note that the C++ solution uses std::string
methods for character manipulation. The Java solution uses helper functions for character type checking (lowercase, uppercase, digit). The Python solution leverages Python's built-in string methods for this purpose.