Is Bcrypt used for Hashing or Encryption? A bit of confusion
Asked Answered
D

3

26

I have been reading about bcrypt (application perspective). Thinking of using it to store passwords on my site.

Out of some stuff that I read it suggests either ways:

  • e.g. 1: Bcrypt is a cross platform file encryption utility from bcrypt
  • e.g. 2: bcrypt is an adaptive password hashing algorithm which uses the Blowfish keying schedule, not a symmetric encryption algorithm. from How To Safely Store A Password
  • bcrypt is an adaptive cryptographic hash function for passwords designed by Niels Provos and David Mazières, based on the Blowfish cipher: from bcrypt wiki

What exactly is Bcrypt?

Dryad answered 27/1, 2012 at 15:36 Comment(2)
Stack Overflow is a site for programming and development questions. This question appears to be off-topic because it is not about programming or development. See What topics can I ask about here in the Help Center. Perhaps Cryptography Stack Exchange or Information Security Stack Exchange would be a better place to ask.Urger
@Urger after 5 year this question not marked as off-topic.Reaganreagen
C
26

It is both :)

Most of the time when people mention BCrypt, they are talking about the adaptive hash algorithm, but it is also the name of an unrelated file encryption utility.

Both are based on the Blowfish cipher.

Concert answered 27/1, 2012 at 15:43 Comment(3)
So, you mean to say I will be using, the adaptive hash algorithm when I use bcrypt to store password?Dryad
@ThinkingMonkey. Yes, provided you pick the right one. I added (your) links into my answer to hopefully make the difference clearer.Concert
Nice. I actually have the same links mentioned in the question. :)Dryad
C
10

Bcrypt encryption software uses the Blowfish algorithm designed by Bruce Schneier in 1993. [1]

The bcrypt hash function is just that, a hash function. It does not perform encryption, it hashes. It's based on the Blowfish cipher, and is considered a good thing because you can make it slower over time.

From Wikipedia:

This is not cryptographically significantly stronger than the standard Blowfish key schedule, but the number of rekeying rounds is configurable; the hashing process can therefore be made arbitrarily slow, which helps deter brute-force attacks upon the hash or salt.

In regards to storing passwords on your site, you should be encrypting passwords before you hash them.

Only after you encrypt them with some encryption algorithm (e.g. Blowfish, Rijndael / AES) should you use bcrypt to hash the ciphered passwords, and store the password hashes.

For more details on implementing password security, see the top answer to this question.

Conversable answered 27/1, 2012 at 15:55 Comment(3)
His name is 'Schneier', not 'Schneider'.Beene
To nitpick :) you don't need to encrypt before hashing.Concert
@CharlesRobertson - why would encrypting a password before hashing it make it more secure? To make it computationally more expensive? Bcrypt is already tuneable in that regard. It would make the value to be hashed longer, but using a longer salt would achieve the same thing. I did read your link, and it doesn't mention this process as far as I could see.Fluecure
K
3

bcrypt is a key derivation function for passwords.

Also the difference between hashing (used by bcrypt) and encryption in simple words is:

  1. encrypted data can be decrypted via a secret key.
  2. Hashing is one-way, that is, if you hash the plain text it's irreversible, hence more secure. The only way to perform the verification is to re-hash the plain text and compare it with previously hashed data for equality.
Koo answered 31/1, 2016 at 19:16 Comment(0)

© 2022 - 2024 — McMap. All rights reserved.