PASSWORD_DEFAULT vs PASSWORD_BCRYPT
Asked Answered
P

3

29

What is the difference between PASSWORD_DEFAULT and PASSWORD_BCRYPT? Do they both use Blowfish encryption algorithm? What is cost in an algorithm? How to set up password_hash in PHP produce a 255-hash length instead of 60?

Pacification answered 13/3, 2014 at 23:25 Comment(6)
Why do you want a 255 character hash rather than the generated 60 character hash?Trigraph
Slowing down BruteForce attacks?Pacification
A longer hash won't do anything to slow down brute-force attacks, cost does this for you.... longer !== more secure, or slowerTrigraph
Doesn't take it longer to decrypt a 255 hash string rather than 60? It will take much time I think. Can you explain me why it is better to rise the cost rather than increasing hash length?Pacification
Nope, length isn't the primary factor related to speed of breaking a hash.... entropy of the bits in that length matters more than the length itself, and a deliberate slowdown of the hashing execution reduces the effectiveness of using a processor farm for trying millions of possibilities per second to hundreds of possibilities. password_hash() is deliberately slow, and increasing the cost affects reduces that speed even moreTrigraph
Thanks again for these great and clear answers. :)Pacification
T
39

Currently PASSWORD_BCRYPT is the only algorithm supported (using CRYPT_BLWFISH), therefore there is currently no difference between PASSWORD_DEFAULT and PASSWORD_BCRYPT. The purpose of PASSWORD_DEFAULT is to allow for the inclusion of additional algorithms in the future, whereupon PASSWORD_DEFAULT will always be used to apply the strongest supported hashing algorithm.

Cost is related to the number of iterations of the algorithm that are executed, and affects the speed of calculation as well as the hash value generated. Higher costs take longer to execute, slowing brute force attacks

Trigraph answered 13/3, 2014 at 23:29 Comment(5)
I stumbled upon one of your answers Mark, while Googling the subject. Actually, my query was "how do hackers obtain passwords mysql php?" since I've always asked myself the very same question as my query. If a machine figures out a password, shouldn't that be matched against the username associated with it, and how would they obtain in from the DB in the first place?... which I haven't really found an answer to those questions.Nomism
There's many ways that a hacker can gain access to a list of users and passwords, not least an SQL injection vulnerability that allows them to modify a query, or physical access to a database server. Which is why the password hash needs to be protectedTrigraph
I had the same question, but just echo'd CRYPT_BLWFISH, PASSWORD_BCRYPT, and PASSWORD_DEFAULT, and found they all had the same value as "1", thus they must be currently the same.Manna
If the default changes in the future, is it likely to be backwards compatible with reading existing passwords stored in the DB?Should
@Should Yes it will be backward compatible, because part of the generated data includes the algorithm used, so password_verify() will always know how to verify the hashTrigraph
M
4

As Per the documentation PASSWORD_DEFAULT is meant to be future proof

From the docs:

PASSWORD_DEFAULT - Use the bcrypt algorithm (default as of PHP 5.5.0). Note that this constant is designed to change over time as new and stronger algorithms are added to PHP. For that reason, the length of the result from using this identifier can change over time. Therefore, it is recommended to store the result in a database column that can expand beyond 60 characters (255 characters would be a good choice).

Monadelphous answered 13/3, 2014 at 23:29 Comment(0)
S
2

There is no difference between PASSWORD_DEFAULT and PASSWORD_BCRYPT for the moment. Refer here

The cost will depend on the number of rounds the hash will be applied. It is also explained in the link above. If you want to increase the security of your hash, you better increase the number of rounds instead of the length.

Senescent answered 13/3, 2014 at 23:35 Comment(0)

© 2022 - 2024 — McMap. All rights reserved.