In August 2011, Randall Munroe published XKCD #936, and password security changed forever. The comic made a simple, mathematical case: a memorable 4-word passphrase like "correct horse battery staple" is BOTH more secure AND easier to remember than "Tr0ub4dor&3" — the kind of "complex" password that millions of websites still demand. Fifteen years later, that comic is still the best 1-minute introduction to password security.
Generate your own XKCD-style passphrase.
Open Passphrase Generator →XKCD #936 compares two passwords:
| Password | Bits of entropy | Years to crack at 1000 guesses/sec |
|---|---|---|
| Tr0ub4dor&3 | ~28 bits | 3 days |
| correct horse battery staple | ~44 bits | 550 years |
The "complex" password loses to the simple passphrase in BOTH security and memorability. The reason: complex passwords use limited substitution patterns (a→@, o→0, e→3) that crackers know about. A genuinely random 4-word passphrase has more entropy because there are millions of possible combinations.
The classic complex password formula:
This feels secure but isn't, because crackers know the formula. They run dictionaries through every common substitution pattern in seconds. The base word "Troubadour" is in the dictionary, so the cracker tries it with every plausible substitution. Total search space: ~10,000 variations of "Troubadour." Cracked instantly.
A genuinely random 4-word passphrase doesn't have this weakness because there's no base word — every word is independently random. The search space is roughly (word list size)^4. For a 2048-word list, that's 17.5 trillion combinations. For a 7776-word Diceware list, that's 3.6 quadrillion combinations.
Randall Munroe's calculation in panel 2:
The 16-bit difference looks small but represents a 65,000x increase in search space.
Two things have changed since the comic:
| Account type | Recommended length | Bits of entropy |
|---|---|---|
| Throwaway account | 4 words | ~44 bits |
| Personal account | 5 words | ~55 bits |
| Important account | 6 words | ~66 bits |
| High-value account | 7 words | ~77 bits |
| Crypto/master key | 8+ words | ~88+ bits |
For comparison, NIST recommends 64+ bits for passwords protecting sensitive information. A 6-word passphrase comfortably exceeds this.
The free Bison Passphrase Generator follows the XKCD approach exactly:
Open it, click Generate New a few times until you get one you like, and save it in your password manager.
Before 2011, every "secure password" guide pushed character substitution. After 2011, the conversation shifted toward length over complexity. By 2017, NIST officially updated SP 800-63B to recommend long passphrases instead of forced character classes. By 2026, every major password manager has a built-in passphrase generator. All of this can be traced back to a comic that made the math obvious in three panels.
Beyond the entropy calculation, XKCD #936 made two more valuable points:
Generate an XKCD-style passphrase now.
Open Passphrase Generator →