Zero Data RetentionQuantum-Ready Entropy256-bit MinimumClient-Side OnlyPost-Quantum ReadyZero KnowledgeNIST SP 800-63BFIPS 140-3 AlignedNo Account NeededDoD CompliantZero Data RetentionQuantum-Ready Entropy256-bit MinimumClient-Side OnlyPost-Quantum ReadyZero KnowledgeNIST SP 800-63BFIPS 140-3 AlignedNo Account NeededDoD Compliant
Concepts8 min readUpdated January 2025

Passphrase vs Password: Which Is Actually More Secure?

NIST Special Publication 800-63B recommends passphrases over complex short passwords. Here is the entropy math that explains why 'correct-horse-battery-staple' beats 'P@ssw0rd'.

Definitions

A password is a relatively short string of characters — typically 8–20 characters — drawn from a pool of letters, numbers, and symbols. The security model depends on unpredictability and pool size. Example: nX9#kT2@mP5!

A passphrase is a longer string composed of multiple words. The security model depends on the number of words and the size of the word pool. Example: correct-horse-battery-staple (the famous XKCD 936 example) or violet marble funnel sunrise.

Both are forms of "something you know" authentication. The difference is in how they achieve security and usability.

Entropy comparison

Entropy is the right way to compare them. Let's do the math honestly.

Random password, 12 characters, full ASCII (94-character pool):
Entropy = 12 × log₂(94) = 12 × 6.55 = 78.6 bits

Random password, 16 characters, full ASCII:
Entropy = 16 × log₂(94) = 16 × 6.55 = 104.8 bits

Diceware passphrase, 4 words, EFF large word list (7,776 words):
Entropy = 4 × log₂(7776) = 4 × 12.92 = 51.7 bits

Diceware passphrase, 5 words, EFF large word list:
Entropy = 5 × log₂(7776) = 5 × 12.92 = 64.6 bits

Diceware passphrase, 6 words, EFF large word list:
Entropy = 6 × log₂(7776) = 6 × 12.92 = 77.5 bits

Credential typeLengthEntropyExample strength
4-word EFF passphrase~24 chars avg51.7 bitsMarginal
8-char random full ASCII8 chars52.4 bitsMarginal
5-word EFF passphrase~30 chars avg64.6 bitsAdequate
12-char random full ASCII12 chars78.6 bitsStrong
6-word EFF passphrase~36 chars avg77.5 bitsStrong
16-char random full ASCII16 chars104.8 bitsVery strong
7-word EFF passphrase~42 chars avg90.3 bitsVery strong
20-char random full ASCII20 chars131 bitsPost-quantum safe

The takeaway: a 6-word passphrase and a 12-character random password have roughly equivalent entropy (~78 bits). The passphrase is 3× longer in character count but far easier to type and remember.

Memorability and usability

This is where passphrases win decisively. The human brain is designed to encode and retrieve linguistic sequences — words, stories, and verbal patterns. It is not designed to remember arbitrary strings of characters.

Research on password memorability consistently shows:

  • Passphrases are 2–3× easier to recall accurately after a 1-week delay than equivalent-entropy random passwords
  • Users who are forced to use complex passwords are significantly more likely to write them down, store them insecurely, or reuse them
  • The cognitive cost of passphrases is lower even at greater entropy levels — "violet marble funnel sunrise" is easier to remember than "nX9#kT2@mP" despite higher entropy

There is one important caveat: the passphrase must be randomly generated, not human-chosen. When people choose their own passphrases, they pick words with strong associations (blue sky happy dog), names, song lyrics, or memorable quotes. These have dramatically lower effective entropy than randomly generated word combinations because attackers can model human preferences.

Attack resistance

Different attack types favour different credential types:

Brute force attacks: Both benefit equally from higher entropy. At equal entropy, the attack difficulty is identical — brute force doesn't care whether you're attacking a random string or a random word sequence.

Dictionary attacks on random passphrases: A randomly chosen passphrase from a known word list (like the EFF list) is actually slightly more vulnerable than the entropy calculation suggests — because an attacker who knows you used the EFF list can target that specific space. A 5-word EFF passphrase has 64.6 bits of entropy from that dictionary's perspective, but an attacker trying all combinations of 5 EFF words can crack it significantly faster than a general brute force would suggest.

Dictionary attacks on random passwords: A randomly generated character-based password has no dictionary to attack. An attacker must brute-force the full character space.

Pattern attacks on human-chosen passphrases: This is the critical weakness. Humans choosing passphrases gravitate toward:

  • Song lyrics, movie quotes, book titles
  • Geographic references (city + street + number)
  • Famous phrases with simple substitutions
  • Personal associations (pet names, family members)

These are all in attacker wordlists. Human-chosen passphrases consistently crack faster than their theoretical entropy suggests.

When to use each

The best choice depends on the use case:

  • Use a passphrase for: Credentials you must memorise without a password manager — primary email account, device unlock PIN, password manager master password, recovery codes
  • Use a random password for: Any credential stored in a password manager. Since you're not memorising it, length and memorability are irrelevant. A randomly generated 20-character full-ASCII password stored in a vault is superior to a passphrase in every measurable way.
  • Use a passphrase for: Situations where you need to type the credential frequently on varying keyboards (SSH server passwords, shared team credentials typed by multiple people)
  • Use a random password for: Any compliance-governed credential (HIPAA, PCI-DSS) — regulators and auditors may not recognise passphrase-based approaches, and the length-vs-complexity requirements can be ambiguous

Diceware and the EFF word list

Diceware is the gold standard method for generating passphrases. The process:

  1. Download the EFF Large Wordlist — 7,776 words, each indexed by a 5-digit dice roll (11111 to 66666)
  2. Roll 5 physical dice (or use a cryptographically secure random source)
  3. Look up the result in the wordlist
  4. Repeat for each word in the passphrase
  5. Separate words with spaces, hyphens, or nothing — your choice

The EFF wordlist was specifically designed for memorability — it excludes offensive words, proper nouns, and hard-to-spell terms. Each word averages about 7 characters, meaning a 5-word passphrase averages about 35 characters.

Software alternatives to physical dice: any CSPRNG that maps uniformly to the word list. PassGeni's passphrase mode uses this approach.

Never use "famous quotes" or song lyrics as a passphrase. Even obscure lyrics appear in cracking wordlists. The first time a passphrase gets cracked anywhere, attackers add that phrase to their dictionaries. True randomness is non-negotiable.

Common passphrase mistakes

  • Choosing words yourself: Human choices cluster on a tiny fraction of possible word combinations. Use a random generator.
  • Using too few words: 3-word passphrases have only 38.8 bits of entropy from the EFF list — weaker than an 8-character random password.
  • Adding a digit or symbol at the end: correct-horse-battery-staple1! adds almost nothing. The extra predictable characters don't significantly increase entropy.
  • Using a small word list: Not all passphrase generators use the EFF large list. A 1,000-word list gives only 9.97 bits per word — a 5-word passphrase is less than 50 bits.
  • Reusing across accounts: A passphrase cracked in one context immediately exposes all accounts where it's reused.

Compliance considerations

Most compliance frameworks were written with character-based passwords in mind. Here is how they handle passphrases:

  • NIST 800-63B: Explicitly encourages passphrases. Sets maximum length at 64+ characters to support them. No complexity requirements that would disadvantage passphrases.
  • PCI-DSS v4.0: Explicitly permits passphrases (Requirement 8.3.6 guidance). Minimum passphrase length is 15 characters.
  • HIPAA: Leaves implementation to covered entities. Passphrases that meet minimum entropy thresholds should be acceptable — document the decision explicitly.
  • SOC 2: Auditors assess controls against best practices. A well-documented passphrase policy referencing NIST 800-63B should satisfy CC6.1 requirements.
  • ISO 27001: Framework-based, not prescriptive. Passphrases aligned with documented policy satisfy the intent of Annex A.9.

The verdict

There is no universal winner. The right answer depends on the use case:

  • For your password manager master password: 6-word Diceware passphrase. You must memorise it, and it's the key to everything else.
  • For everything in your password manager: 16–20 character randomly generated full-ASCII password. The vault handles memorability. Maximise entropy.
  • For shared team credentials typed frequently: 5–6 word Diceware passphrase. Balances security and usability across people.
  • For compliance-regulated systems: Random passwords meeting the specific framework requirements — passphrases can require additional documentation.

The common thread: whatever you use must be randomly generated. Human choice is the enemy of password security, regardless of whether you're choosing a character string or a sequence of words.

PassGeni supports both modes. The Passphrase tab generates random word sequences using the EFF large wordlist and a CSPRNG. The Password tab generates random character strings with configurable pool and length. Both display entropy in bits so you can compare directly.

Frequently asked questions

Are passphrases more secure than passwords?

Passphrases are more secure than typical short complex passwords but can be less secure than very long random passwords. A 4-word passphrase from a 7,776-word wordlist gives ~51 bits of entropy. A 20-character random password from full ASCII gives ~130 bits. For memorised credentials, passphrases win; for stored credentials, random passwords win on entropy.

What does NIST say about passphrases vs passwords?

NIST Special Publication 800-63B recommends length as the primary password quality metric and explicitly supports passphrases. It discourages mandatory complexity rules that produce predictable patterns. NIST recommends accepting any password of 8+ characters and allows passphrases with spaces — maximums should be at least 64 characters.

How many words should a passphrase have?

4 words gives approximately 51 bits of entropy (from a 7,776-word Diceware list), which NIST considers sufficient for most uses. 5 words gives ~62.5 bits. 6 words gives ~77.5 bits, which exceeds most high-security thresholds. For a password manager master password, 6 words is a practical recommendation.

Can I use any words in a passphrase?

For maximum security, passphrase words should be randomly selected from a large wordlist — not chosen by the user. Human-chosen words cluster on predictable patterns (common words, favourite things, pop culture references). PassGeni's passphrase mode uses cryptographic randomness to select from a curated word pool, preventing this bias.

Do passphrases meet corporate password complexity requirements?

Often not automatically — many corporate systems enforce complexity rules (uppercase + number + symbol) that passphrases don't satisfy by default. This is a policy deficiency, not a security deficiency. Organizations should update their password policies to allow passphrases as a NIST-recommended alternative. A passphrase with a capitalised first word and a number appended satisfies most systems.

What is the entropy of a 4-word passphrase?

From a 7,776-word Diceware wordlist (the standard): 4 words = 4 × log2(7776) = 4 × 12.92 = 51.7 bits of entropy. This assumes words are randomly selected. User-chosen words have significantly lower entropy due to predictable selection patterns.

Can passphrases be cracked by dictionary attacks?

Multi-word passphrase attacks (trying combinations of dictionary words) are used by sophisticated attackers. Against 4 randomly-chosen words from a large wordlist, this attack is computationally infeasible — there are too many combinations. Against user-chosen words from common themes, it's more practical, which is why random selection matters.

Which is better for a password manager master password — passphrase or password?

A passphrase is better for a password manager master password because it must be memorised and typed, not autofilled. A 5-6 word random passphrase provides excellent entropy (60-77 bits) while being genuinely typeable under pressure. A 20-character random password is more secure on paper but effectively impossible to reliably type without errors.

Do passphrases work for all types of accounts?

Most modern authentication systems accept passphrases (they're just longer passwords). Exceptions: some legacy systems have maximum length limits of 16 or 20 characters, which a multi-word passphrase may exceed. Also, some systems reject spaces in passwords — using a separator like hyphens or dots usually works around this.

How does PassGeni generate passphrases?

PassGeni's passphrase tab uses crypto.getRandomValues() to randomly select words from a curated word pool seeded with profession-relevant vocabulary. Selection is cryptographically random — no human pattern bias. The profession seeding makes individual words more recognisable to the user without reducing the entropy of the word selection process.

Related guides
← All guidesGenerate password →