Why Passphrases, Not Passwords
When securing your PGP keys, email accounts, or any sensitive information, the strength of your authentication matters tremendously. Traditional passwords are increasingly vulnerable to modern attack methods, while longer passphrases offer superior security and usability.
Security Alert
Security Fact
A four-word passphrase like "correct horse battery staple" would take approximately 550 years to crack via brute force at 1,000 guesses per second, while a complex but shorter password like "Tr0ub4dor&3" would take only about 3 days.
The Problems with Traditional Passwords
- Too short: Even with special characters, most passwords don't have enough entropy (randomness)
- Hard to remember: Complex passwords with special characters are difficult to recall
- Reuse risk: When passwords are hard to remember, people tend to reuse them across services
- Predictable patterns: People tend to use predictable substitutions (e.g., 'a' → '@')
Benefits of Passphrases
- Higher entropy: Length beats complexity in cryptographic strength
- Easier to remember: Our brains are wired to remember phrases, not random characters
- Easier to type: Especially on mobile devices or when using PGP frequently
- Lower error rate: Less frustration from typing mistakes
What Makes a Good Passphrase?
Effective passphrases balance security and memorability. Here are the key attributes:
1. Length
Aim for at least 4-5 random words. Each additional word exponentially increases security.
2. Randomness
Words should be truly random, not a famous quote, song lyric, or common phrase that could be guessed.
3. Uncommon Words
Using less common words increases security, but be careful not to make them so obscure that you forget them.
4. Optional: Mix in Numbers or Symbols
While not strictly necessary with sufficient length, adding a number, symbol, or capitalization can further strengthen your passphrase.
Tip
Try the Passphrase Tester
Visit useapassphrase.com to test the strength of your passphrases and learn more about passphrase security.
Methods for Generating Strong Passphrases
The Diceware Method
Diceware is a cryptographically sound method for creating random passphrases using ordinary dice and a wordlist. It's completely offline and generates truly random combinations.
- Get a Diceware wordlist (a list of 7,776 words, each assigned a 5-digit number)
- Roll five dice together (or one die five times) to get a 5-digit number
- Look up the corresponding word in the wordlist
- Repeat for each word in your passphrase (aim for at least 5-6 words)
- Combine the words to form your passphrase
Secure Passphrase Generators
Several reputable tools can generate random passphrases for you:
- EFF's Dice-Generated Passphrases: eff.org/dice
- Bitwarden Password Generator: Set to "passphrase" mode
- KeePassXC: Includes a built-in passphrase generator
Warning
Avoid Online Generators
For maximum security, don't use random online passphrase generators for your most critical passphrases (like your PGP master key). Offline methods or trusted password managers are safer.
The Story Method
If you need to create a memorable passphrase without tools:
- Choose a random starting point (e.g., look around the room and pick 5 objects)
- Create a short, bizarre story connecting these items
- Use the key words from this story as your passphrase
- Add a number or symbol for extra security
For example, seeing a lamp, book, coffee cup, plant, and window might give you: "bright book sips green outside"
Securely Storing and Managing Passphrases
Memory Techniques
For your most critical passphrases (like your PGP master key), memorization is essential. These techniques can help:
- Visualization: Create a mental image connecting your passphrase words
- Spaced repetition: Practice typing your passphrase daily, then weekly
- Mnemonic devices: Create a story or sentence where each word starts with the same letter as your passphrase words
Password Managers
For most services (except your master encryption keys), use a password manager:
- Store unique, random passphrases for each service
- Only need to remember one master passphrase
- Many offer additional security features like breach monitoring
Information
PGP Key Passphrase Special Considerations
Your PGP master key passphrase is particularly important:
- It protects your digital identity
- It cannot be reset if forgotten
- It should be memorized, not stored in a password manager
- Consider using a longer passphrase (6+ words) for this purpose
When to Change Your Passphrases
Unlike the outdated advice to change passwords regularly, modern security guidance suggests:
- Change passphrases only if there's a reason to believe they've been compromised
- Use different passphrases for different services
- Consider rotating your subkey passphrases on a schedule if you're in a high-security environment
Special Considerations for PGP Keys
When using passphrases with PGP:
Master Key vs. Subkey Passphrases
Consider using:
- Your strongest, most memorable passphrase for your master key
- Different (but still strong) passphrases for subkeys
- A hardware security key like YubiKey for subkeys when possible
Passphrase Caching
Most PGP implementations can cache your passphrase temporarily to avoid repetitive typing:
- GnuPG uses gpg-agent with configurable timeout
- Secure Mail Client allows session-based caching
- Balance security needs with convenience based on your threat model
Conclusion
Passphrases represent a significant improvement over traditional passwords, especially for critical security applications like PGP key protection. By using random, sufficiently long word combinations, you can create authentication that is both more secure and more usable.
Remember that your passphrase is the gateway to your encrypted data and digital identity. The time invested in creating and memorizing a strong passphrase is minimal compared to the security benefits it provides.
Next Steps
Now that you understand passphrases, consider:
- Creating a new strong passphrase for your PGP key
- Setting up a password manager for your other accounts
- Learning about basic digital security practices