Passphrase Generator

Generate strong, memorable passphrases from random words. Easier to remember, just as secure as random characters.

Use + D to bookmark this tool
pwgen — generate passphrase
guest@pwgen:~$ generate passphrase --words=5 --separator="-"
excellent · ~65 bits
words
5
separator
style
[init] wordlist loaded — 7776 words (EFF)
[info] all generation client-side · zero server requests

What Is a Passphrase?

A passphrase is a sequence of random words used as a password. Instead of a string of random characters like "x7#kQ9$mP", you get something like "correct-horse-battery-staple" — much easier to remember, yet equally secure (or even more secure due to length).

The concept was famously illustrated by XKCD comic #936. A 5-word passphrase from a 7,776-word list provides approximately 64 bits of entropy — equivalent to a 10-character random password using all character types.

Passphrase vs Traditional Password

TypeExampleEntropyMemorabilityCrack Time
8-char passwordXy7#kP2m48 bitsPoor~1 year
12-char passwordqM8$vL3nRx!p79 bitsVery poor34,000 years
4-word passphrasecorrect-horse-battery-staple52 bitsExcellent~3 hours
5-word passphrasemarble-sunset-kitchen-pilot-crane64 bitsExcellent~46 minutes*
6-word passphrasezebra-quantum-fuzzy-widget-ocean-lamp77 bitsGood~550 years

* Crack times assume 10 billion guesses/sec against a fast hash (MD5). With proper hashing (bcrypt, Argon2), times increase by orders of magnitude.

Passphrase vs Password

💬 Passphrase
Examplemarble-sunset-kitchen-pilot
MemorabilityExcellent — visualize a story
Security~64 bits (5 words)
TypingEasy — real words, fewer errors
CompatibilityNeeds generous length limits
Best forMaster passwords, device logins, WiFi
🔒 Random Password
ExamplekX9#mQ2$vL3n
MemorabilityPoor — looks like line noise
Security~79 bits (12 chars, all types)
TypingSlow — special chars, mixed case
CompatibilityWorks everywhere
Best forPassword managers, strict sites, APIs

Our Word List Quality

7,776 unique wordsEFF diceware standard
~12.9 bits/word
4–8 letters averageEasy to type and read
no obscure words
No similar wordsAvoids confusing pairs
minimal typos
Crypto-random selectioncrypto.getRandomValues()
true randomness

NIST SP 800-63B Compliance

Our passphrase generator aligns with NIST Special Publication 800-63B — the U.S. federal standard for digital identity authentication. Key requirements met:

  • 3+ random words = 64+ bits entropy — exceeds the minimum strength threshold
  • No arbitrary composition rules — NIST discourages forcing "Password1!" style requirements
  • Length over complexity — NIST recommends allowing long passwords (up to 64+ chars)
  • Browser-based randomness — crypto.getRandomValues() provides OS-level entropy
  • Zero server storage — nothing is transmitted or logged

More Security Tools

Frequently Asked Questions

How many words should I use?

At least 5 words for strong security (~64 bits of entropy). Use 6-7 words for high-security accounts. Each additional word multiplies the difficulty of cracking by 7,776x.

What wordlist do you use?

We use a curated list of common English words. Each word is selected from a pool of 7,776 words, matching the EFF's recommended diceware standard.

Should I add numbers or symbols?

It adds a small amount of extra entropy but isn't necessary if you use enough words. Adding a number and symbol can help meet specific site requirements that demand mixed character types.

Can attackers just guess words?

They'd need to guess the exact combination. With 5 random words from 7,776, there are 7,776^5 ≈ 28 trillion combinations. At 10 billion guesses/sec, that takes over 46 minutes — and 6 words takes 250 days.

Is a passphrase more secure than a password?

A passphrase can be equally or more secure than a traditional password, depending on word count. A 6-word passphrase provides ~77 bits of entropy — comparable to a 12-character random password — while being far easier to remember.

Are passphrases NIST approved?

Yes. NIST SP 800-63B recommends using memorized secrets of sufficient length and discourages arbitrary composition rules (like requiring uppercase + symbol). Passphrases of 3+ random words exceed the minimum 64-bit entropy threshold.

Copied to clipboard ✓