Diceware Passphrase
Generate memorable Diceware passphrases.
Overview
The Diceware passphrase generator produces a memorable, high-entropy password by stitching together random words from the Diceware wordlist. Pick a length, hit generate, and get something like tribe oasis voucher banjo perch sailor — strong enough for a master password yet still typeable on a phone.
It is what privacy-conscious users, security trainers, and OPSEC-minded reporters reach for when "P@ssw0rd!" no longer cuts it. A Diceware passphrase generator gives you the entropy of a long random string but in a form your brain will accept after one or two reads.
How it works
Arnold Reinhold's 1995 Diceware scheme maps 5 dice rolls to a 7776-word list (6^5 = 7776). Each word therefore contributes log2(7776) ≈ 12.92 bits of entropy. The tool reads cryptographically secure random bytes (via the browser's crypto.getRandomValues), converts groups of bytes into uniformly distributed indices into the wordlist, and joins them with separators. A 6-word passphrase carries roughly 77 bits of entropy — well above what is feasible to brute-force against a properly-hashed credential.
The classic Diceware list contains short, mostly common English words; the EFF long list (used by default in many tools) trades some compactness for words with unambiguous spellings.
Examples
Length: 6 words
Output: tribe oasis voucher banjo perch sailor
Length: 8 words
Output: anchor pamper relish saddle vacant kindly umpire ripple
Length: 4 words
Output: rainfall jukebox tundra magnet
FAQ
How many words is enough?
Six EFF-long-list words give ~77 bits — strong enough for offline-attack resistance for the foreseeable future. Four words (~52 bits) is OK for accounts behind a rate-limited login; a master password protecting a vault should be six or more.
Is it really stronger than a complex 12-character random string?
Roughly equal entropy at the same length, but Diceware is dramatically easier to memorise. The whole point is that you can actually remember the result without writing it down.
Why does the random source matter?
If the words are not chosen uniformly at random, the entropy estimate falls apart. A weak PRNG could leak predictable patterns. This tool uses the browser's CSPRNG, which is cryptographically sound.
Should I add numbers or symbols?
Length beats complexity. A long, all-lowercase passphrase is stronger and more memorable than a short jumble of punctuation. Add a digit or symbol only if your password policy demands one.