Passphrase Generator

Generate strong, memorable passphrases from random words. Easier to remember, just as secure as random characters.

Use + D to bookmark this tool
pwgen — generate passphrase
guest@pwgen:~$ generate passphrase --words=5 --separator="-"
excellent · ~65 bits
words
5
separator
style
[init] wordlist loaded — 7776 words (EFF)
[info] all generation client-side · zero server requests

What Is a Passphrase?

A passphrase is a sequence of random words used as a password. Instead of a string of random characters like "x7#kQ9$mP", you get something like "correct-horse-battery-staple" — much easier to remember, yet equally secure (or even more secure due to length).

The concept was famously illustrated by XKCD comic #936. A 5-word passphrase from a 7,776-word list provides approximately 64 bits of entropy — equivalent to a 10-character random password using all character types.

Passphrase vs Traditional Password

TypeExampleEntropyMemorabilityCrack Time
8-char passwordXy7#kP2m48 bitsPoor~1 year
12-char passwordqM8$vL3nRx!p79 bitsVery poor34,000 years
4-word passphrasecorrect-horse-battery-staple52 bitsExcellent~3 hours
5-word passphrasemarble-sunset-kitchen-pilot-crane64 bitsExcellent~46 minutes*
6-word passphrasezebra-quantum-fuzzy-widget-ocean-lamp77 bitsGood~550 years

* Crack times assume 10 billion guesses/sec against a fast hash (MD5). With proper hashing (bcrypt, Argon2), times increase by orders of magnitude.

Passphrase vs Password

💬 Passphrase
Examplemarble-sunset-kitchen-pilot
MemorabilityExcellent — visualize a story
Security~64 bits (5 words)
TypingEasy — real words, fewer errors
CompatibilityNeeds generous length limits
Best forMaster passwords, device logins, WiFi
🔒 Random Password
ExamplekX9#mQ2$vL3n
MemorabilityPoor — looks like line noise
Security~79 bits (12 chars, all types)
TypingSlow — special chars, mixed case
CompatibilityWorks everywhere
Best forPassword managers, strict sites, APIs

Our Word List Quality

7,776 unique wordsEFF diceware standard
~12.9 bits/word
4–8 letters averageEasy to type and read
no obscure words
No similar wordsAvoids confusing pairs
minimal typos
Crypto-random selectioncrypto.getRandomValues()
true randomness

NIST SP 800-63B Compliance

Our passphrase generator aligns with NIST Special Publication 800-63B — the U.S. federal standard for digital identity authentication. Key requirements met:

  • 3+ random words = 64+ bits entropy — exceeds the minimum strength threshold
  • No arbitrary composition rules — NIST discourages forcing "Password1!" style requirements
  • Length over complexity — NIST recommends allowing long passwords (up to 64+ chars)
  • Browser-based randomness — crypto.getRandomValues() provides OS-level entropy
  • Zero server storage — nothing is transmitted or logged

More Security Tools

🔒

Password Generator

Generate strong, random passwords with customizable length, character sets, and options.

🧠

Memorable Password Generator

Create easy to remember passwords from random words or your own phrases with leet speak conversion.

Bulk Password Generator

Generate multiple unique passwords at once. Perfect for IT admins and account provisioning.

🔑

API Key Generator

Generate cryptographically secure API keys, tokens, and secrets in multiple formats.

📡

WiFi Password Generator

Generate strong, easy-to-share WiFi passwords for your home or office network.

📱

WiFi QR Code Generator

Create a scannable QR code for your WiFi network. Guests connect instantly.

🔓

WiFi QR to Password Converter

Extract the WiFi password from a QR code image. Upload or paste — no camera needed.

🔢

PIN Generator

Generate cryptographically random PIN codes. Perfect for device locks and access codes.

🛡

Password Strength Checker

Test how strong your password is. See estimated crack time, entropy, and suggestions.

🧮

Password Entropy Calculator

Calculate the exact entropy of any password configuration. See bits, combinations, and crack times.

#️⃣

MD5 Hash Generator

Generate MD5 hashes from any text. Useful for checksums, cache keys, and legacy system compatibility.

#️⃣

SHA-512 Hash Generator

Generate SHA-512 hashes using the native Web Crypto API. 512-bit security for signatures and integrity.

Login Barcode Generator

Generate a Code 128 barcode that types username, TAB, password, ENTER into login forms when scanned.

📺

Easy-Type Password Generator

Generate passwords optimized for TVs, game consoles, and devices with on-screen keyboards. No symbols.

🗣

Pronounceable Password Generator

Generate speakable passwords from fake syllables. Easy to say aloud, type from memory, and share verbally.

🌈

Password Generator for Kids

Generate fun, memorable passwords children can actually remember. Word stories: red-panda-jumps-42.

Frequently Asked Questions

How many words should I use?

At least 5 words for strong security (~64 bits of entropy). Use 6-7 words for high-security accounts. Each additional word multiplies the difficulty of cracking by 7,776x.

What wordlist do you use?

We use a curated list of common English words. Each word is selected from a pool of 7,776 words, matching the EFF's recommended diceware standard.

Should I add numbers or symbols?

It adds a small amount of extra entropy but isn't necessary if you use enough words. Adding a number and symbol can help meet specific site requirements that demand mixed character types.

Can attackers just guess words?

They'd need to guess the exact combination. With 5 random words from 7,776, there are 7,776^5 ≈ 28 trillion combinations. At 10 billion guesses/sec, that takes over 46 minutes — and 6 words takes 250 days.

Is a passphrase more secure than a password?

A passphrase can be equally or more secure than a traditional password, depending on word count. A 6-word passphrase provides ~77 bits of entropy — comparable to a 12-character random password — while being far easier to remember.

Are passphrases NIST approved?

Yes. NIST SP 800-63B recommends using memorized secrets of sufficient length and discourages arbitrary composition rules (like requiring uppercase + symbol). Passphrases of 3+ random words exceed the minimum 64-bit entropy threshold.

Copied to clipboard ✓