Blog
Custom Print on Demand Apparel — Free Storefront for Your Business
Wild & Free Tools

How Many Words Should a Passphrase Have? (Entropy Bits Explained)

Last updated: April 20266 min readGenerator Tools

"How many words" is the most important question in passphrase security, and most guides give a vague answer like "more is better." The actual answer is precise: it depends on the threat model. This guide gives you the math, the recommended numbers for common situations, and a tool that calculates entropy as you generate.

Generate a passphrase with entropy displayed.

Open Passphrase Generator →

The entropy table

For a passphrase generator using a 2048-word list (BIP-39 size), the entropy per word is log2(2048) = 11 bits. So:

WordsBits of entropyPossible combinationsThreat resistance
3338.6 billionHours (modern GPU)
44417.6 trillionMonths
55536 quadrillionDecades
66673 quintillionMillennia
777149 sextillionEffectively forever (today)
888303 septillionEffectively forever
999617 octillionEffectively forever
101101.3 nonillionEffectively forever

For comparison, a passphrase generator using the EFF Long word list (7776 words) gives ~12.9 bits per word, so a 5-word EFF passphrase is roughly equivalent to a 6-word 2048-word passphrase. Both are excellent.

The recommended numbers

Use caseRecommended lengthBitsWhy
Throwaway forum account3-4 words33-44Doesn't matter much
Personal email5 words55Important but not catastrophic if leaked
Bank login6 words66High value, fraud risk
Password manager master6-7 words66-77Single point of failure
Disk encryption7-8 words77-88Resists offline attack with full GPU farms
Crypto wallet8+ words88+Irrecoverable if cracked

Why 4 words used to be enough

The famous XKCD comic from 2011 recommended 4 words and calculated ~44 bits of entropy. At the time, this was overkill for most accounts. The comic estimated 550 years to crack at 1000 guesses per second.

But cracking has gotten much faster. A modern GPU can guess billions of passwords per second, not 1000. The same 4-word passphrase that took 550 years in 2011 takes hours today on commodity hardware. This is why we now recommend 5-6 words instead of 4.

Why more than 7 words is rarely necessary

At 77 bits of entropy (7 words), the passphrase is computationally infeasible to brute force with current technology. Even with the entire Bitcoin mining network's hash rate (~600 exahash/sec), brute forcing a 77-bit passphrase would take longer than the age of the universe.

The only reason to go beyond 7 words is for long-term storage where you're worried about future computing improvements (quantum computers, breakthroughs in cryptanalysis). For storage that needs to be secure for decades, 8-10 words is reasonable.

Online vs offline attacks

The threat model matters because attack speeds differ dramatically:

Attack typeSpeedBits needed for "decades" of protection
Online (web login)~10 guesses/sec (rate-limited)~40 bits (4 words)
Online (no rate limit)~1000 guesses/sec~50 bits (5 words)
Offline (CPU brute force)~1 million/sec~60 bits (5-6 words)
Offline (GPU brute force)~10 billion/sec~70 bits (6-7 words)
Offline (specialized hardware)~1 trillion/sec~80 bits (7-8 words)

For online attacks (someone trying to log into your account from the web), 5 words is plenty. The website limits how fast they can try.

For offline attacks (someone has stolen a password database and is brute-forcing the hashes), you need more bits because they can guess much faster. 6-7 words is the right answer.

When the passphrase is the master key

For your password manager master password, full disk encryption, or a crypto wallet seed phrase, ALL of your other security depends on this one passphrase. Don't economize. Use 7+ words. The extra typing time is trivial compared to the catastrophic loss if it's cracked.

The "memorability cliff"

Most people can comfortably remember a 5-word passphrase with practice. 6 words is harder but doable. 7+ requires real effort or a mnemonic device. This creates a tension: more words = more security, but also more risk of forgetting.

The solution: use a 6-7 word passphrase for the few critical things you need to type (password manager master, full disk encryption), and let the password manager generate longer random passwords for everything else.

Calculating entropy for your specific generator

The formula is simple: entropy = words × log2(word_list_size)

If you're using the Bison Passphrase Generator, the entropy is shown directly below the generated passphrase along with a strength label (Weak / Moderate / Strong / Very Strong). You don't need to calculate it manually.

Practical recommendations

  1. Personal accounts (email, social, shopping): 5 words. Enough for the threat model, easy to remember.
  2. Bank, brokerage, important services: 6 words. Adds a meaningful security buffer.
  3. Password manager master: 6-7 words. This is the single most important password you have.
  4. Crypto wallet, encryption keys: 8+ words. Future-proof against improvements in cracking.
  5. Throwaway accounts: 4 words is fine. Or use a password manager and don't think about it.

Generate a passphrase with entropy bits shown.

Open Passphrase Generator →
Launch Your Own Clothing Brand — No Inventory, No Risk