Bitcoin Security

Seed Phrase Passphrase: The 25th Word Guide

Seed phrase passphrase 25th word security guide with combination safe metaphor
Reading Time: 10 minutes

Seed Phrase Passphrase: The 25th Word Guide

Most Bitcoin users know their 12 or 24-word seed phrase is the master key to their funds. Fewer realize there is a standardized mechanism built into BIP39 that lets you add an extra word — a passphrase — that fundamentally changes the wallet derived from that seed. This passphrase is often called the “25th word,” though it can be any string of characters, not just a single dictionary word. When used correctly, it adds a powerful layer of protection against physical theft, coercion, and even sophisticated supply-chain attacks on hardware wallets.

This tutorial walks through the technical foundation, practical setup steps on popular hardware wallets, security best practices, and the real risks you need to understand before enabling a passphrase on your own wallet.

Prerequisites

Before you start, make sure you have the following in place:

  • A hardware wallet you already own and have initialized. If you haven’t purchased one yet, read the Hardware Wallet Buying Guide first.
  • Your seed phrase already generated and backed up securely — ideally on metal. See Seed Phrase Storage Best Practices for detailed guidance.
  • A small amount of bitcoin (or testnet coins) for verification testing.
  • A second, physically separate backup location for your passphrase.

What Is the BIP39 Passphrase?

The BIP39 specification, published in 2013, defines how mnemonic seed phrases are converted into the binary seed that generates all of your private keys. What many people miss is that the specification includes an optional passphrase field in that conversion process. When the passphrase field is left empty (the default), an empty string is used. When you supply a passphrase, it gets mixed into the derivation and produces a completely different master seed — and therefore a completely different set of addresses, keys, and balances.

The term “25th word” is a simplification. The passphrase is not restricted to a single word from the BIP39 wordlist. It can be any UTF-8 string: a single word, a full sentence, numbers, special characters, or a combination. The BIP39 wordlist is irrelevant here. Your passphrase can be “correct horse battery staple” or “Tr0ub4dor&3” or anything else you choose.

How It Works Technically

Understanding the cryptography removes the mystery and helps you make better security decisions.

The Derivation Process

When your hardware wallet converts your seed phrase into a master seed, it runs the following process:

  1. Mnemonic to entropy: Your 12 or 24 words are decoded back into the original entropy plus checksum.
  2. PBKDF2-HMAC-SHA512: The mnemonic sentence (words joined by spaces) is used as the password input. The string "mnemonic" + passphrase is used as the salt. The function runs 2,048 iterations.
  3. Output: A 512-bit (64-byte) master seed.

The critical detail: changing even one character of the passphrase changes the salt, which means the PBKDF2 function produces an entirely different 512-bit output. There is no mathematical relationship between the wallet derived with passphrase “alpha” and the wallet derived with passphrase “alpha1”. They are as unrelated as two wallets generated from different seed phrases entirely.

This is also why there is no “wrong passphrase” error. Every passphrase — including an empty one — produces a valid wallet. Your hardware wallet cannot tell you that you typed the passphrase incorrectly, because from its perspective, every input is correct. It simply derives whatever wallet corresponds to whatever you typed. This property is both a feature and a risk, as we will discuss later.

For a deeper look at the key derivation mathematics, see HD Wallet Math: Public Key Derivation.

Plausible Deniability: Decoy Wallets

The most discussed benefit of the passphrase feature is plausible deniability. Here is how it works in practice:

Suppose an attacker gains physical access to your seed phrase backup. Without a passphrase, they have everything needed to steal your funds. With a passphrase enabled, the seed phrase alone opens a wallet — but it is not the wallet where you keep your main holdings. You can intentionally deposit a small amount of bitcoin into the “no passphrase” wallet (or a decoy passphrase wallet) so that an attacker sees a plausible balance and may assume they have found everything.

Your real funds sit in the wallet derived from seed phrase + your actual passphrase, which exists only in your memory or in a separate physical backup stored elsewhere.

This works because:

  • There is no way to determine whether a passphrase is in use just by examining the seed phrase.
  • There is no limit to the number of passphrases (and therefore wallets) that can be derived from a single seed phrase.
  • Each derived wallet is cryptographically independent.

Plausible deniability is not bulletproof. A sophisticated attacker who knows you use Bitcoin and finds only a trivial balance may suspect a hidden wallet. But it raises the cost of attack significantly, especially in opportunistic theft scenarios. For a broader look at layered security strategies, read Bitcoin Security Architecture: Cold Storage, Hot Wallets, and Risk Management.

Step-by-Step: Enabling the Passphrase on Your Hardware Wallet

The exact menu path differs by device, but the process follows the same logic on every wallet. Below are general instructions for three popular brands.

Trezor (Safe 3 / Safe 5)

  1. Connect your Trezor and open Trezor Suite on your computer.
  2. Navigate to Settings > Device > Safety > Passphrase.
  3. Enable the passphrase feature. Trezor Suite will ask you to confirm on the device.
  4. Confirm on the device screen by tapping or pressing the button.
  5. Disconnect and reconnect. On next unlock, you will be prompted to enter a passphrase.
  6. Enter your chosen passphrase. The device will derive and open the corresponding wallet.
  7. Verify the receiving address shown matches what you expect (it will be different from your original no-passphrase wallet).
  8. Send a small test amount to this new wallet and confirm it arrives.
  9. Disconnect the device, reconnect, enter the same passphrase again, and confirm the balance is still visible. This proves you can reliably reproduce the passphrase entry.

Coldcard (MK4 / Q)

  1. Power on the Coldcard (battery or USB — the Coldcard supports air-gapped operation).
  2. Navigate to Passphrase from the main menu.
  3. Choose how to enter the passphrase: you can type it directly using the numeric keypad (MK4) or the QWERTY keyboard (Q model).
  4. Enter your passphrase and press OK.
  5. The Coldcard will display the master fingerprint of the resulting wallet. Write this fingerprint down. It is the fastest way to verify you entered the passphrase correctly in the future.
  6. Apply the passphrase. The Coldcard now operates as if this is a different wallet entirely.
  7. Export the wallet file (via microSD or NFC) to your coordinator software (Sparrow, Electrum, etc.).
  8. Send a small test amount and confirm receipt.
  9. Power cycle the Coldcard, re-enter the passphrase, and verify the fingerprint matches what you recorded.

Ledger (Nano S Plus / Nano X / Flex)

  1. On the Ledger device itself, go to Settings > Security > Passphrase.
  2. Choose “Attach to PIN” (recommended) or “Set temporary”. The “Attach to PIN” option lets you create a secondary PIN code that automatically loads the passphrase wallet, so you do not need to type the passphrase each time.
  3. Enter your passphrase on the device.
  4. If you chose “Attach to PIN,” set a secondary PIN (different from your primary PIN).
  5. Confirm and save. The device will now derive the passphrase wallet.
  6. Open Ledger Live. You will need to add accounts again, because the addresses are different.
  7. Send a small test amount and verify.
  8. Power cycle the device. Unlock with the secondary PIN (if you attached to PIN) and verify the balance is there.

Security Best Practices

Passphrase Strength Guidelines

Your passphrase protects against an attacker who already has your seed phrase. That means it must withstand offline brute-force attacks. A weak passphrase — a single common word, a birthday, a pet’s name — can be cracked quickly.

  • Use 4 or more random words (Diceware-style). Four words from a 7,776-word list give roughly 51 bits of entropy. Six words give roughly 77 bits, which is beyond practical brute-force range for the foreseeable future.
  • Avoid personally meaningful phrases. Song lyrics, quotes, family names — all of these are in attacker dictionaries.
  • Case sensitivity matters. “Alpha” and “alpha” produce different wallets. Decide on a capitalization convention and stick with it.
  • Spaces matter. “correct horse” and “correcthorse” are different passphrases.
  • Special characters and numbers add strength but also add memorization difficulty and transcription error risk. If you use them, document them precisely in your backup.

Backup Your Passphrase Separately

The entire point of the passphrase is that it is stored separately from the seed phrase. If you write both on the same piece of paper and store them in the same safe, you have gained nothing.

  • Store the passphrase in a different physical location from the seed phrase.
  • Consider stamping the passphrase on a metal plate, just as you would a seed phrase.
  • If you use a password manager as one backup layer, ensure the password manager itself is secured with a strong master password and is not the only copy.
  • Think about inheritance. If something happens to you, can your heirs reconstruct both the seed phrase and the passphrase? See Bitcoin Inheritance Planning for detailed guidance.

Test Before Committing Funds

  1. Enable the passphrase and open the new wallet.
  2. Record the first receiving address and the master key fingerprint.
  3. Send a trivial amount of bitcoin.
  4. Power off the hardware wallet completely.
  5. Power it back on, enter the passphrase again.
  6. Verify the receiving address and fingerprint match. Verify the balance is visible.
  7. Only after this round-trip confirmation should you move larger amounts.

The Risks: What Can Go Wrong

Forgotten Passphrase = Lost Funds

This is the single biggest risk. Unlike a forgotten password on a web service, there is no reset mechanism. No customer support. No recovery option. If you forget the passphrase — even by one character — the bitcoin in that wallet is inaccessible forever. The seed phrase alone will only open the default (no-passphrase) wallet, which is a completely different set of addresses.

Typos During Setup

Because every passphrase produces a valid wallet, a typo during initial setup means you send funds to a wallet derived from the typo. When you later enter what you believe is the correct passphrase, you will see an empty wallet. This is why the test-with-small-amount step is non-negotiable.

Complexity Creep

Some users create multiple passphrase wallets (a decoy, a main, a savings tier). This multiplies the backup burden and increases the chance of confusion. Unless you have a clear operational need, one passphrase wallet plus the default decoy wallet is sufficient for most individuals.

Encoding Issues

BIP39 specifies UTF-8 NFKD normalization for passphrases. In practice, this means accented characters, emoji, and non-ASCII text can behave unpredictably across different wallet software. Stick to basic ASCII characters (letters, numbers, common punctuation) to avoid normalization-related surprises.

Troubleshooting Common Issues

“I entered my passphrase and see an empty wallet.”

You almost certainly entered the passphrase differently than when you first set it up. Check for: trailing spaces, capitalization differences, numeral vs. spelled-out numbers, or a different keyboard layout. Remember, the wallet has no way to tell you the passphrase is “wrong” — it just derives a different wallet.

“My hardware wallet doesn’t prompt me for a passphrase.”

The passphrase feature must be explicitly enabled on most devices. It is disabled by default. Check your device settings.

“I want to change my passphrase.”

You cannot change the passphrase associated with an existing wallet. Instead, create a new passphrase wallet, send funds from the old wallet to the new one, and then retire the old passphrase. Always test the new passphrase wallet before moving significant funds.

“Should I use the passphrase with a multisig setup?”

You can, but it adds complexity. In a multisig configuration, each key in the quorum can optionally use a passphrase. This means more items to back up and more things that can go wrong. Most multisig users skip the passphrase because the multisig structure already provides the security and redundancy benefits. Read Multi-Sig Wallet Configurations for a full breakdown of multisig tradeoffs.

Passphrase vs. Other Security Layers

The passphrase is one tool in a broader security toolkit. It is not a substitute for proper seed phrase storage, and it does not protect against all threats. Consider how it fits alongside other measures:

Threat Passphrase Helps? Better/Additional Protection
Seed phrase physically stolen Yes — attacker gets decoy wallet only Metal backup in secure location
Hardware wallet stolen (locked) Yes — attacker must also know passphrase Device PIN, wipe after failed attempts
Supply chain attack on device Partially — depends on attack vector Verify firmware, buy from manufacturer
$5 wrench attack (physical coercion) Partially — plausible deniability Multisig with geographically distributed keys
Forgotten credentials No — it increases this risk Robust backup strategy, inheritance plan

For a comprehensive understanding of how different wallet architectures handle security, read The Evolution of Bitcoin Wallet Architecture.

Part of our free Bitcoin course: This topic is covered in depth in
Seed Phrase Storage Best Practices from the
Bitcoin Wallets & Self-Custody course.

Frequently Asked Questions

Is the 25th word passphrase the same as my hardware wallet PIN?

No. The PIN protects physical access to the hardware wallet device. The passphrase modifies the cryptographic derivation of your wallet from the seed phrase. They operate at entirely different layers. Your PIN is device-specific — if you restore your seed on a new device, you set a new PIN. Your passphrase is tied to the seed phrase itself — it produces the same wallet on any device or software that implements BIP39.

Can I use a passphrase with a 12-word seed phrase, or does it require 24 words?

The passphrase works with any BIP39 seed phrase, regardless of length. A 12-word seed with a strong passphrase is cryptographically sound. The passphrase adds its own entropy on top of whatever entropy the seed phrase provides. That said, a 24-word seed provides 256 bits of entropy compared to 128 bits for 12 words, so some security-conscious users prefer 24 words as the base.

What happens to my passphrase wallet if the hardware wallet manufacturer goes out of business?

Nothing changes. The BIP39 passphrase is an open standard. Any wallet software or hardware that implements BIP39 can derive the same wallet from your seed phrase plus passphrase. You are not locked into any vendor. You could restore your wallet in Sparrow, Electrum, BlueWallet, or on a completely different hardware wallet from a different manufacturer. This is one of the strengths of open standards in Bitcoin custody. For more on firmware and manufacturer dependency, see Hardware Wallet Firmware Updates.

Should I use a passphrase if I already use multisig?

For most users, multisig already provides the security benefits that a passphrase offers — and then some. A 2-of-3 multisig means an attacker must compromise two separate keys in two separate locations, which is arguably stronger than a single key protected by a passphrase. Adding passphrases to each key in a multisig setup multiplies the backup complexity (now you have three seed phrases and three passphrases to store and protect). The general recommendation: use passphrase for single-sig setups; for multisig, the quorum structure itself is your protection layer. Read Transitioning from Single-Sig to Multisig to decide which model fits your situation.

For a broader perspective, explore our Bitcoin seed phrase security guide.

{“@context”: “https://schema.org”, “@type”: “FAQPage”, “mainEntity”: [{“@type”: “Question”, “name”: “Is the 25th word passphrase the same as my hardware wallet PIN?”, “acceptedAnswer”: {“@type”: “Answer”, “text”: “No. The PIN protects physical access to the hardware wallet device. The passphrase modifies the cryptographic derivation of your wallet from the seed phrase. They operate at entirely different layers. Your PIN is device-specific — if you restore your seed on a new device, you set a new PIN. Your passphrase is tied to the seed phrase itself — it produces the same wallet on any device or software that implements BIP39.”}}, {“@type”: “Question”, “name”: “Can I use a passphrase with a 12-word seed phrase, or does it require 24 words?”, “acceptedAnswer”: {“@type”: “Answer”, “text”: “The passphrase works with any BIP39 seed phrase, regardless of length. A 12-word seed with a strong passphrase is cryptographically sound. The passphrase adds its own entropy on top of whatever entropy the seed phrase provides. That said, a 24-word seed provides 256 bits of entropy compared to 128 bits for 12 words, so some security-conscious users prefer 24 words as the base.”}}, {“@type”: “Question”, “name”: “What happens to my passphrase wallet if the hardware wallet manufacturer goes out of business?”, “acceptedAnswer”: {“@type”: “Answer”, “text”: “Nothing changes. The BIP39 passphrase is an open standard. Any wallet software or hardware that implements BIP39 can derive the same wallet from your seed phrase plus passphrase. You are not locked into any vendor. You could restore your wallet in Sparrow, Electrum, BlueWallet, or on a completely different hardware wallet from a different manufacturer. This is one of the strengths of open standards in Bitcoin custody. For more on firmware and manufacturer dependency, see Hardware Wallet Firmw…”}}, {“@type”: “Question”, “name”: “Should I use a passphrase if I already use multisig?”, “acceptedAnswer”: {“@type”: “Answer”, “text”: “For most users, multisig already provides the security benefits that a passphrase offers — and then some. A 2-of-3 multisig means an attacker must compromise two separate keys in two separate locations, which is arguably stronger than a single key protected by a passphrase. Adding passphrases to each key in a multisig setup multiplies the backup complexity (now you have three seed phrases and three passphrases to store and protect). The general recommendation: use passphrase for single-sig se…”}}]}

Search on Knowing Bitcoin