What is BCrypt and Why Should We Use It?

Around the world, passwords play a critical role in keeping your data and other important information safe. Therefore, it is very important to ensure that your passwords remain secure. If not, the consequences could be catastrophic.

Hashed password solutions are inadequate

Many encryption algorithms are not good enough and put your data and resources at risk. Let's take a look at some examples.

Plain text passwords

When the name is violated, the plaintext password uses only letters. If a hacker accesses such passwords, they can easily appear as users on your system. Most often, plaintext passwords are also duplicated between other entries, because users do not have to remember multiple passwords for different sites or applications. This only allows a hacker to access these applications.

Hash Encryption

With a password, the hash algorithm does not store plaintext passwords to authenticate the user. Here, a hash algorithm is applied to make a password more secure. In theory, although this is a much better password solution, hackers have found ways within this system, since the algorithm used is not exactly a one-way option. In fact, hackers can continue to guess passwords until they access your resources.

BCrypt Solution

So, is there a solution for the right password encryption? Anything to protect your valuable data and resources, no matter what? Yes, there is! Designed by Niels Provos and David Mazières in 1999, BCrypt comes in the form of a hashing function.

BCrypt is based on the Blowfish block encryption encryption algorithm and takes the form of an adaptive hash function. But why use it to protect your data and resources? We're going to need some technical knowledge to explain...

Using a Key Factor, BCrypt can set hash. With Key Factor changes, hash output may be affected. In this way, BCrypt remains extremely resistant to attacks, especially a type of password crack called a rainbow table.

This Key Factor will continue to be an important feature as computers become more powerful in the future. reason? Because this compensates for powerful computers and significantly slows down the hash speed.

If you have sensitive data or information that you need to protect, it's important to make sure it's properly secure. As we can see, there are many ways to secure this information with various password methods, but only BCrypt offers a really robust solution.


KARABAY A, 2020 . What is BCrypt and Why Should We Use It ?,


(Accessed July 21, 2020).

  Share this post

Comments (0)


Sign up for the email newsletter to be the first to know about my blog posts