Is Bcrypt used for Hashing or Encryption? A bit of confusion

19,116

Solution 1

It is both :)

Most of the time when people mention BCrypt, they are talking about the adaptive hash algorithm, but it is also the name of an unrelated file encryption utility.

Both are based on the Blowfish cipher.

Solution 2

Bcrypt encryption software uses the Blowfish algorithm designed by Bruce Schneier in 1993. [1]

The bcrypt hash function is just that, a hash function. It does not perform encryption, it hashes. It's based on the Blowfish cipher, and is considered a good thing because you can make it slower over time.

From Wikipedia:

This is not cryptographically significantly stronger than the standard Blowfish key schedule, but the number of rekeying rounds is configurable; the hashing process can therefore be made arbitrarily slow, which helps deter brute-force attacks upon the hash or salt.

In regards to storing passwords on your site, you should be encrypting passwords before you hash them.

Only after you encrypt them with some encryption algorithm (e.g. Blowfish, Rijndael / AES) should you use bcrypt to hash the ciphered passwords, and store the password hashes.

For more details on implementing password security, see the top answer to this question.

Solution 3

bcrypt is a key derivation function for passwords

Also difference between hashing(used by bcrypt) and encryption in simple words will be -

1) encrypted data can be decrypted via private key. 2) Hashing is one way that is if you hash the plain text its irreversible, hence more secure. The only way to ensure is rehash the plain text and compare it with previously hashed data for equality.

Share:
19,116

Related videos on Youtube

ThinkingMonkey
Author by

ThinkingMonkey

Free-Thinker, Individualist, INTP

Updated on August 25, 2020

Comments

  • ThinkingMonkey
    ThinkingMonkey over 3 years

    I have been reading about bcrypt (application perspective). Thinking of using it to store passwords on my site.

    Out of some stuff that I read it suggests either ways:

    • e.g. 1: Bcrypt is a cross platform file encryption utility from bcrypt
    • e.g. 2: bcrypt is an adaptive password hashing algorithm which uses the Blowfish keying schedule, not a symmetric encryption algorithm. from How To Safely Store A Password
    • bcrypt is an adaptive cryptographic hash function for passwords designed by Niels Provos and David Mazières, based on the Blowfish cipher: from bcrypt wiki

    What exactly is Bcrypt?

  • ThinkingMonkey
    ThinkingMonkey over 12 years
    So, you mean to say I will be using, the adaptive hash algorithm when I use bcrypt to store password?
  • PaulG
    PaulG over 12 years
    @ThinkingMonkey. Yes, provided you pick the right one. I added (your) links into my answer to hopefully make the difference clearer.
  • ThinkingMonkey
    ThinkingMonkey over 12 years
    Nice. I actually have the same links mentioned in the question. :)
  • Martin Ellis
    Martin Ellis over 12 years
    His name is 'Schneier', not 'Schneider'.
  • PaulG
    PaulG over 12 years
    To nitpick :) you don't need to encrypt before hashing.
  • Charles Robertson
    Charles Robertson over 8 years
    @PaulG it does add an extra level of security if you encrypt as well, and is considered good practice, as long as you store the secret key on a different server or if this is too expensive, in a text file on the remote server's local file system.
  • Charles Robertson
    Charles Robertson over 8 years
    @PaulG This link explains best practices for salt hash and encrypting salt hash using a secret key. BCrypt is just a more convenient way to salt hash because the salt does not require DB storage: crackstation.net/hashing-security.htm
  • Ben Hull
    Ben Hull over 7 years
    @CharlesRobertson - why would encrypting a password before hashing it make it more secure? To make it computationally more expensive? Bcrypt is already tuneable in that regard. It would make the value to be hashed longer, but using a longer salt would achieve the same thing. I did read your link, and it doesn't mention this process as far as I could see.
  • Robert Talada
    Robert Talada almost 4 years
    It's a myth that obscurity cannot create a more secure situation. Ask any administrator that has put a service on a non-standard port. 99.9% of attackers can't be bothered to check other ports because it takes too much time.