Definitions
A password is a relatively short string of characters — typically 8–20 characters — drawn from a pool of letters, numbers, and symbols. The security model depends on unpredictability and pool size. Example: nX9#kT2@mP5!
A passphrase is a longer string composed of multiple words. The security model depends on the number of words and the size of the word pool. Example: correct-horse-battery-staple (the famous XKCD 936 example) or violet marble funnel sunrise.
Both are forms of "something you know" authentication. The difference is in how they achieve security and usability.
Entropy comparison
Entropy is the right way to compare them. Let's do the math honestly.
Random password, 12 characters, full ASCII (94-character pool):
Entropy = 12 × log₂(94) = 12 × 6.55 = 78.6 bits
Random password, 16 characters, full ASCII:
Entropy = 16 × log₂(94) = 16 × 6.55 = 104.8 bits
Diceware passphrase, 4 words, EFF large word list (7,776 words):
Entropy = 4 × log₂(7776) = 4 × 12.92 = 51.7 bits
Diceware passphrase, 5 words, EFF large word list:
Entropy = 5 × log₂(7776) = 5 × 12.92 = 64.6 bits
Diceware passphrase, 6 words, EFF large word list:
Entropy = 6 × log₂(7776) = 6 × 12.92 = 77.5 bits
| Credential type | Length | Entropy | Example strength |
|---|---|---|---|
| 4-word EFF passphrase | ~24 chars avg | 51.7 bits | Marginal |
| 8-char random full ASCII | 8 chars | 52.4 bits | Marginal |
| 5-word EFF passphrase | ~30 chars avg | 64.6 bits | Adequate |
| 12-char random full ASCII | 12 chars | 78.6 bits | Strong |
| 6-word EFF passphrase | ~36 chars avg | 77.5 bits | Strong |
| 16-char random full ASCII | 16 chars | 104.8 bits | Very strong |
| 7-word EFF passphrase | ~42 chars avg | 90.3 bits | Very strong |
| 20-char random full ASCII | 20 chars | 131 bits | Post-quantum safe |
The takeaway: a 6-word passphrase and a 12-character random password have roughly equivalent entropy (~78 bits). The passphrase is 3× longer in character count but far easier to type and remember.
Memorability and usability
This is where passphrases win decisively. The human brain is designed to encode and retrieve linguistic sequences — words, stories, and verbal patterns. It is not designed to remember arbitrary strings of characters.
Research on password memorability consistently shows:
- Passphrases are 2–3× easier to recall accurately after a 1-week delay than equivalent-entropy random passwords
- Users who are forced to use complex passwords are significantly more likely to write them down, store them insecurely, or reuse them
- The cognitive cost of passphrases is lower even at greater entropy levels — "violet marble funnel sunrise" is easier to remember than "nX9#kT2@mP" despite higher entropy
There is one important caveat: the passphrase must be randomly generated, not human-chosen. When people choose their own passphrases, they pick words with strong associations (blue sky happy dog), names, song lyrics, or memorable quotes. These have dramatically lower effective entropy than randomly generated word combinations because attackers can model human preferences.
Attack resistance
Different attack types favour different credential types:
Brute force attacks: Both benefit equally from higher entropy. At equal entropy, the attack difficulty is identical — brute force doesn't care whether you're attacking a random string or a random word sequence.
Dictionary attacks on random passphrases: A randomly chosen passphrase from a known word list (like the EFF list) is actually slightly more vulnerable than the entropy calculation suggests — because an attacker who knows you used the EFF list can target that specific space. A 5-word EFF passphrase has 64.6 bits of entropy from that dictionary's perspective, but an attacker trying all combinations of 5 EFF words can crack it significantly faster than a general brute force would suggest.
Dictionary attacks on random passwords: A randomly generated character-based password has no dictionary to attack. An attacker must brute-force the full character space.
Pattern attacks on human-chosen passphrases: This is the critical weakness. Humans choosing passphrases gravitate toward:
- Song lyrics, movie quotes, book titles
- Geographic references (city + street + number)
- Famous phrases with simple substitutions
- Personal associations (pet names, family members)
These are all in attacker wordlists. Human-chosen passphrases consistently crack faster than their theoretical entropy suggests.
When to use each
The best choice depends on the use case:
- Use a passphrase for: Credentials you must memorise without a password manager — primary email account, device unlock PIN, password manager master password, recovery codes
- Use a random password for: Any credential stored in a password manager. Since you're not memorising it, length and memorability are irrelevant. A randomly generated 20-character full-ASCII password stored in a vault is superior to a passphrase in every measurable way.
- Use a passphrase for: Situations where you need to type the credential frequently on varying keyboards (SSH server passwords, shared team credentials typed by multiple people)
- Use a random password for: Any compliance-governed credential (HIPAA, PCI-DSS) — regulators and auditors may not recognise passphrase-based approaches, and the length-vs-complexity requirements can be ambiguous
Diceware and the EFF word list
Diceware is the gold standard method for generating passphrases. The process:
- Download the EFF Large Wordlist — 7,776 words, each indexed by a 5-digit dice roll (11111 to 66666)
- Roll 5 physical dice (or use a cryptographically secure random source)
- Look up the result in the wordlist
- Repeat for each word in the passphrase
- Separate words with spaces, hyphens, or nothing — your choice
The EFF wordlist was specifically designed for memorability — it excludes offensive words, proper nouns, and hard-to-spell terms. Each word averages about 7 characters, meaning a 5-word passphrase averages about 35 characters.
Software alternatives to physical dice: any CSPRNG that maps uniformly to the word list. PassGeni's passphrase mode uses this approach.
Common passphrase mistakes
- Choosing words yourself: Human choices cluster on a tiny fraction of possible word combinations. Use a random generator.
- Using too few words: 3-word passphrases have only 38.8 bits of entropy from the EFF list — weaker than an 8-character random password.
- Adding a digit or symbol at the end:
correct-horse-battery-staple1!adds almost nothing. The extra predictable characters don't significantly increase entropy. - Using a small word list: Not all passphrase generators use the EFF large list. A 1,000-word list gives only 9.97 bits per word — a 5-word passphrase is less than 50 bits.
- Reusing across accounts: A passphrase cracked in one context immediately exposes all accounts where it's reused.
Compliance considerations
Most compliance frameworks were written with character-based passwords in mind. Here is how they handle passphrases:
- NIST 800-63B: Explicitly encourages passphrases. Sets maximum length at 64+ characters to support them. No complexity requirements that would disadvantage passphrases.
- PCI-DSS v4.0: Explicitly permits passphrases (Requirement 8.3.6 guidance). Minimum passphrase length is 15 characters.
- HIPAA: Leaves implementation to covered entities. Passphrases that meet minimum entropy thresholds should be acceptable — document the decision explicitly.
- SOC 2: Auditors assess controls against best practices. A well-documented passphrase policy referencing NIST 800-63B should satisfy CC6.1 requirements.
- ISO 27001: Framework-based, not prescriptive. Passphrases aligned with documented policy satisfy the intent of Annex A.9.
The verdict
There is no universal winner. The right answer depends on the use case:
- For your password manager master password: 6-word Diceware passphrase. You must memorise it, and it's the key to everything else.
- For everything in your password manager: 16–20 character randomly generated full-ASCII password. The vault handles memorability. Maximise entropy.
- For shared team credentials typed frequently: 5–6 word Diceware passphrase. Balances security and usability across people.
- For compliance-regulated systems: Random passwords meeting the specific framework requirements — passphrases can require additional documentation.
The common thread: whatever you use must be randomly generated. Human choice is the enemy of password security, regardless of whether you're choosing a character string or a sequence of words.