Security
Pronounceable Password Generator
Generate random passwords that are easy to pronounce and communicate verbally. Ideal for phone support and shared access. Free, browser-based, no signup.
About this pronounceable password generator
Sometimes a password needs to be communicated verbally — reading it to someone over the phone, dictating it to a colleague during setup, or sharing a temporary access code in a meeting. Random strings like "xK#9mQ$2" are nearly impossible to communicate accurately without the NATO phonetic alphabet. Pronounceable passwords solve this by using alternating consonant-vowel patterns that form syllable-like structures — "kobami", "luseta", "wopind" — while remaining random and unpredictable. Each syllable is selected randomly, not from a dictionary, so the passwords do not contain real words that could be guessed. This generator creates passwords with pronounceable patterns using mixed character types for the best balance of verbal communication and security.
How pronounceable passwords are constructed
Pronounceable passwords are generated by combining consonant-vowel (CV) or consonant-vowel-consonant (CVC) syllable patterns to produce strings that sound like plausible words without actually being dictionary words. Common consonants (b, d, f, g, k, l, m, n, p, r, s, t, v, w) are paired with vowels (a, e, i, o, u) to create units like "ko", "ba", "mi", "lu", "se", "ta". These units naturally form words that humans can parse and reproduce orally — "kobami" or "luseta" — because they follow the phonological rules of most European languages. The syllables are randomly selected and combined, so the resulting password is not a real word and does not appear in dictionary attack lists. Numbers and a separator character can be inserted between syllables to increase entropy without breaking the verbal communication property: "koba-4mi-luse-ta" is still speakable while being meaningfully stronger than pure syllables.
The security trade-off of pronounceability
Pronounceable passwords trade entropy density for verbal communicability. A fully random character string uses the maximum possible character set uniformly — every position is independently and uniformly random from the full character pool. A pronounceable password constrains each position: after a consonant, a vowel is likely; the same consonant rarely appears twice in immediate sequence. This constraint reduces the number of possible passwords at a given length compared to fully random generation. The practical implication is that a 16-character pronounceable password provides less entropy than a 16-character random password. The mitigation is straightforward: increase the length. A 20-22 character pronounceable password compensates for the reduced entropy density while remaining verbally communicable. For systems with rate limiting (login pages, access codes), the entropy loss is not a meaningful security risk at these lengths. For offline attack scenarios (full-disk encryption, password manager vaults), use a passphrase or random password instead.
Verbal password communication best practices
When a password must be communicated verbally, reducing transcription errors is critical — a single wrong character means a failed login and a frustrating support call. The NATO phonetic alphabet (Alpha, Bravo, Charlie, Delta, Echo, Foxtrot...) is the most reliable disambiguation tool: "kilo-oscar-bravo-alpha-mike-india" is unambiguous in a way that the individual letters "k-o-b-a-m-i" often are not over a noisy phone connection. For numbers, speak each digit individually rather than as a whole number: "four-two" rather than "forty-two" to avoid confusion. For uppercase and lowercase, specify explicitly: "capital K, lowercase o, capital B..." Always read the password back to the recipient before ending the call and confirm they can type it successfully. For particularly long or complex pronounceable passwords, consider breaking it into segments and verifying each segment before moving to the next.
Pronounceable passwords for helpdesk and IT support
Helpdesk and IT support teams regularly need to communicate temporary passwords to users who cannot access their accounts. Random strings create transcription errors, delays, and repeat calls — costing time and frustrating users. Pronounceable passwords solve this practically: a temporary password like "kobami-9luseta" can be read out clearly in under 10 seconds, typed without error, and used to complete the login. For helpdesk provisioning workflows, using pronounceable passwords also reduces the risk of misheard characters being logged as errors: when a user says "it did not work," a support agent can immediately identify whether the issue was a transcription error by re-reading the syllable pattern. Standard helpdesk practice should include requiring the user to read the password back before attempting login, using a pronounceable format specifically designed for verbal handoff, and immediately prompting the user to change the password after first login so the support agent no longer knows the credential.
Guest access and shared WiFi pronounceable passwords
Home and office guest WiFi networks need passwords that can be shared verbally with visitors without requiring them to read a screen or receive a message. A random WPA2 password like "xK#9mQ$2pLvR" creates a poor experience: guests ask for it to be repeated, mistype characters, and lose connection. A pronounceable WiFi password like "kobami-9luseta" achieves the opposite: it can be spoken once, written in a welcome email, or posted on a sign without causing transcription confusion. For small offices and hospitality environments (restaurants, hotels, co-working spaces), pronounceable WiFi passwords are a practical choice that balances security — they are not dictionary words and cannot be guessed from context — with the usability requirement of being shareable with a diverse population of guests who may not have technical backgrounds. Change the pronounceable WiFi password periodically (quarterly for most environments, monthly for high-traffic locations) to rotate access as the guest population changes.
Related presets
FAQ
Common questions
When should I use a pronounceable password?
When the password must be communicated verbally: phone support access codes, temporary passwords given in person, shared WiFi passwords told to guests, or any situation where someone needs to type what you say aloud.
Is a pronounceable password less secure?
Somewhat — pronounceable patterns reduce the character space compared to fully random strings. A 16-character pronounceable password has less entropy than a 16-character random one. Compensate by using longer passwords (20+ characters) when pronounceability is required.
Can pronounceable passwords contain numbers and symbols?
Yes. Adding a digit or symbol between pronounceable syllables (e.g., "koba4mi-luse") maintains verbal communication ability while increasing entropy. This generator mixes character types within pronounceable structures.
How is this different from a passphrase?
A passphrase uses real dictionary words ("marble-sunset-river"). A pronounceable password uses syllable-like patterns that are not real words ("kobami-luseta"). Pronounceable passwords are shorter but less memorable than passphrases.
How do I spell out a pronounceable password over the phone?
Say each syllable clearly, specify the case where it matters ("capital K"), and use the NATO phonetic alphabet for ambiguous letters ("koba — kilo, oscar, bravo, alpha"). Read it back from the recipient before ending the call to confirm they transcribed it correctly.
Are pronounceable passwords resistant to brute-force attacks?
They are more vulnerable than fully random passwords of the same length, because the pronounceable pattern reduces the effective search space. However, they are still strong if long enough — a 20-character pronounceable password with numbers provides enough entropy to be impractical to crack against a properly rate-limited system.
Can I use a pronounceable password as a WiFi password?
Yes — it is actually a great use case. WiFi passwords need to be shared with guests who type them on their devices. A pronounceable password like "kobami-9luseta" is far easier to dictate than "xK#9mQ$2" while still being unpredictable and meeting WPA2 complexity requirements.
What is the typical entropy of a pronounceable password?
It depends on the generation method. Syllable-based pronounceable passwords typically have 3-5 bits per character versus 5.95-6.57 bits for fully random passwords. A 20-character pronounceable password may provide 60-80 bits of effective entropy — adequate for rate-limited systems but not for offline attacks.
More in Security