Bcrypt

Creator
Creator
Seonglae ChoSeonglae Cho
Created
Created
2021 Nov 23 4:37
Editor
Edited
Edited
2025 Dec 15 10:29
Refs
Refs

Bcrypt: Purpose-Built for Password Security

Bcrypt was specifically designed from the ground up as a slow hashing algorithm for password storage. The intentional computational overhead—taking approximately 300ms to compute a hash on the server—makes it resistant to brute-force attacks.
Key Features:
  • Recommended Configuration: 10 rounds of complexity with salt application
  • Historical Strength: Developed by Niels Provos and David Mazières in 1999, it remains one of the most robust hashing mechanisms in use today
  • Industry Adoption: Serves as the default password authentication mechanism in OpenBSD
  • Adjustable Security: The work factor parameter determines the computational intensity required to generate a single hash digest, allowing administrators to easily enhance system security by simply adjusting this value
  • Technical Constraint: Limited to 72-byte character input values
 
 
 
 
 
 
 

Recommendations