WiFi passwords are uniquely awkward. They need to be strong enough to resist attack, easy enough to read aloud to guests, and memorable enough that you don't have to look them up every time someone visits. Most WiFi passwords fail on at least one of these. A passphrase nails all three.
Generate a WiFi-friendly passphrase now.
Open Passphrase Generator →| Password type | Example | Problems |
|---|---|---|
| Default router password | netgear-1A2B3C | Often printed on router, easy to find |
| Guessable | MySmith2026! | Family name + year, in every cracker dictionary |
| "Complex" | Tr0ub4dor&3 | Unmemorable, weaker than it looks |
| Random characters | xK7$mP9!q2RvN8 | Strong but impossible to share with guests |
| Passphrase | tiger-maple-cloud-river | Strong AND easy to share |
WiFi passwords have a unique constraint: they're shared. You read them aloud to guests, write them on a card by the kitchen, or send them via text. A 16-character random string is hard to read aloud without the listener mishearing characters. A 4-word passphrase is read once and remembered.
Example exchange:
You: "The WiFi password is xK7$mP9!q2RvN8"
Guest: "Wait, was that lowercase x or capital? Was that an exclamation
or a one? Sorry, can you say it again..."
vs.
You: "The WiFi password is tiger maple cloud river."
Guest: [types it] "Got it, thanks."
For home WiFi protected by WPA2 or WPA3, 4-5 words is the sweet spot:
| Length | Example | Pros | Cons |
|---|---|---|---|
| 3 words | horse-battery-staple | Very easy to share | ~33 bits, weak against offline attack |
| 4 words | horse-battery-staple-tiger | Easy to share, ~44 bits | Standard for guest networks |
| 5 words | horse-battery-staple-tiger-moon | ~55 bits, strong | Slightly slower to share |
| 6 words | horse-battery-staple-tiger-moon-river | ~66 bits, very strong | Overkill for most homes |
For most homes, 4 words is plenty. For professional offices or anywhere with sensitive data, 5 words is better.
WPA2 and WPA3 use the passphrase as input to a key derivation function (PBKDF2), not as the password itself. This means each guess by an attacker requires expensive computation, making brute force much slower than for typical password databases.
A 4-word passphrase that would be cracked in hours as a typical password takes centuries to brute force as a WiFi password because each guess takes ~10ms instead of ~10 nanoseconds.
That said, attackers can use rainbow tables and pre-computed hashes for common SSIDs. If your network name is "linksys" or "netgear" or any other common default, attackers may have pre-computed the hashes for your network already. Always rename your network to something custom.
The Bison Passphrase Generator supports several separators. For WiFi passwords:
| Separator | Example | Pros | Cons |
|---|---|---|---|
| Dash (default) | tiger-maple-cloud-river | Universal compatibility | Looks slightly technical |
| Dot | tiger.maple.cloud.river | Easy to read aloud | Some older devices reject |
| Underscore | tiger_maple_cloud_river | Universal compatibility | Confusing to read aloud |
| Space | tiger maple cloud river | Most natural to read | Some devices reject spaces |
| None | tigermaplecloudriver | Compact | Hard to read, hard to share |
For a guest network where you want maximum readability, dots or spaces work best. For your main network where you'll mostly type once and forget, dashes are the safest cross-device choice.
Most routers let you set the WiFi password through:
Generate the passphrase, copy it, and paste it into the WiFi settings. The router applies it within ~30 seconds, after which you'll need to reconnect all your devices with the new password.
Once you have a memorable passphrase, sharing options:
The whole point of using a memorable passphrase is that you can change it without dread. Generate, set, share, done.
Generate a WiFi-friendly passphrase now.
Open Passphrase Generator →