29

I have been reading about bcrypt (application perspective). Thinking of using it to store passwords on my site.

Out of some stuff that I read it suggests either ways:

  • e.g. 1: Bcrypt is a cross platform file encryption utility from bcrypt
  • e.g. 2: bcrypt is an adaptive password hashing algorithm which uses the Blowfish keying schedule, not a symmetric encryption algorithm. from How To Safely Store A Password
  • bcrypt is an adaptive cryptographic hash function for passwords designed by Niels Provos and David Mazières, based on the Blowfish cipher: from bcrypt wiki

What exactly is Bcrypt?

2
  • Stack Overflow is a site for programming and development questions. This question appears to be off-topic because it is not about programming or development. See What topics can I ask about here in the Help Center. Perhaps Cryptography Stack Exchange or Information Security Stack Exchange would be a better place to ask. Commented Feb 25, 2017 at 21:54
  • 1
    @jww after 5 year this question not marked as off-topic. Commented Jul 27, 2017 at 10:05

3 Answers 3

27

It is both :)

Most of the time when people mention BCrypt, they are talking about the adaptive hash algorithm, but it is also the name of an unrelated file encryption utility.

Both are based on the Blowfish cipher.

Sign up to request clarification or add additional context in comments.

3 Comments

So, you mean to say I will be using, the adaptive hash algorithm when I use bcrypt to store password?
@ThinkingMonkey. Yes, provided you pick the right one. I added (your) links into my answer to hopefully make the difference clearer.
Nice. I actually have the same links mentioned in the question. :)
10

Bcrypt encryption software uses the Blowfish algorithm designed by Bruce Schneier in 1993. [1]

The bcrypt hash function is just that, a hash function. It does not perform encryption, it hashes. It's based on the Blowfish cipher, and is considered a good thing because you can make it slower over time.

From Wikipedia:

This is not cryptographically significantly stronger than the standard Blowfish key schedule, but the number of rekeying rounds is configurable; the hashing process can therefore be made arbitrarily slow, which helps deter brute-force attacks upon the hash or salt.

In regards to storing passwords on your site, you should be encrypting passwords before you hash them.

Only after you encrypt them with some encryption algorithm (e.g. Blowfish, Rijndael / AES) should you use bcrypt to hash the ciphered passwords, and store the password hashes.

For more details on implementing password security, see the top answer to this question.

3 Comments

His name is 'Schneier', not 'Schneider'.
To nitpick :) you don't need to encrypt before hashing.
@CharlesRobertson - why would encrypting a password before hashing it make it more secure? To make it computationally more expensive? Bcrypt is already tuneable in that regard. It would make the value to be hashed longer, but using a longer salt would achieve the same thing. I did read your link, and it doesn't mention this process as far as I could see.
3

bcrypt is a key derivation function for passwords.

Also the difference between hashing (used by bcrypt) and encryption in simple words is:

  1. encrypted data can be decrypted via a secret key.
  2. Hashing is one-way, that is, if you hash the plain text it's irreversible, hence more secure. The only way to perform the verification is to re-hash the plain text and compare it with previously hashed data for equality.

Comments

Start asking to get answers

Find the answer to your question by asking.

Ask question

Explore related questions

See similar questions with these tags.