How Tough Is Bcrypt To Crack? Can It Keep Passwords Safe? - Spiceworks (2024)

Darren James, senior product manager of Specops Software, delves into the prowess of bcrypt in fortifying passwords. Learn how bcrypt stands against modern hacking techniques, ensuring a resilient defense

Due to the never-ending threat of cyberattacks in the current digital ecosystem, getting user password security correct should be the bare minimum expected from businesses. Yet, if we truly examine the latest industry findingsOpens a new window , when analyzing over 800 million breached passwords, the most common base terms used in passwords were: ‘password,’ ‘admin,’ ‘welcome,’ and ‘p@ssw0rd’. Passwords containing only lowercase letters were the most common character combinations found, making up 18.82% of passwords used in attacks. Clear passwords remain one of the weakest elements in an organization’s network, leaving security teams at a critical juncture as they battle against unauthorized access and data breaches.

As a result, many have searched high and low for the best means to protect passwords, particularly for secure hashing algorithms, and this has led to the rise of bcrypt. Often hailed for its robustness in safeguarding stored passwords, bcrypt originated in 1999 from the Blowfish cipher algorithm and has emerged as a fortress of password protection. Yet, as technology advances, so do the capabilities of attackers, and further research into bcrypt has unearthed some discoveries in its overall resilience against the face of modern hackers.

Understanding Hashing Algorithms

In its basic form, password hashing places a password through a hashing algorithm to turn the plaintext into an unintelligible series of numbers and letters. They serve as a necessary vanguard against password exposure in storage systems. The one-way transformation they offer ensures that they will remain indecipherable even if a breach occurs and hackers gain access to the hashed passwords. The only way to reveal the actual password from a hash is to guess via brute force techniques or rainbow tables.

Guessing a password, the traditional way, would be impossible for a human, which is why cybercriminals rely on password-cracking software like Hashcat, L0phtcrack, or John The Ripper. A brute force attack would involve trying millions, if not billions, of combinations whilst comparing against many strings to create a password hash. With enough computer power, the task of cracking a password is becoming dangerously rapid.

To cybercriminals this presents a challenge they want to overcome and using sophisticated techniques that leverage powerful hardware and specialized software to crack hashed passwords, the race within the cybersecurity realm is certainly intensifying.

More traditional hashing algorithms like MD5 and SHA-1 were once considered the torch bearers of password protection. But even these defenses have been exposed against the relentless force of modern cracking tools. Despite this fact, despite its compromised security status, MD5 is still among the most frequently cited hash algorithms in leaked datasets.

See More: The Password Expiry Myth: Redefining Password Security

Decrypting bcrypt: A Pillar of Enhanced Password Security

Going into more granular detail, bcrypt transforms user passwords into fixed-length strings through a one-way hashing process. This means any hash reversal is virtually inconceivable, and it cannot be changed back to the original password. Each time a user logs in, the bcrypt technology will re-hash the password, comparing it to the one stored in the system’s memory to see if the two passwords match. Should the plain-text password be short, the process can make it longer and more complex for additional security. Other elements within bcrypt set it apart from other hashing methods.

1. Salting and Complexity Enhancement

To protect against dictionary and brute force attacks, bcrypt deploys salting, where a unique addition is made to each password hash. This process significantly complicates deciphering, augmenting password complexity, and thwarting common hacking tactics.

2. Cost Factor: The Guardian of Security

The ‘cost factor’ is another layer within bcrypt that raises the security bar. This capability consumes the number of password iterations created before the hash is generated and is added in front of the salt. In doing so, it can apply stronger hashing and salting, amplifying the time, effort, and computational resources required for cracking attempts. The outcome is a 24-byte hash that combines password string, salt, and cost factor, a formidable defense for any password.

Gauging the true security of bcrypt

While it may take time for a bcrypt hash to be created, it is deliberately intended to take time to crack. Cracking them is arduous for any threat actor and sets it apart from hashing algorithms MD5 and SHA-256. For example, when a combination of letters, numbers, and symbols is used in an eight-character password, the time to crack it is 286 years. Of course, short, non-complicated passwords, or common passwords like ‘123456’, will be cracked almost immediately. This is why security professionals warn businesses and users to follow security best practices and aim for longer passwords like passphrases.

If you get the right combination, will bcrypt hashing prevent password compromise? No, but then again, there is no silver bullet in cybersecurity, and despite its robustness, bcrypt hashes have been found to be exposed in data breaches. An example is the 2018 MyFitnessPal data breach, where 144 million unique email addresses, usernames, IP addresses, and passwords were exposed despite being stored as SHA-1 and bcrypt hashes. This shows that bcrypt is not impervious to breaches. However, it still stands tall amongst all others, especially regarding password protection and preventing reused credentials and compromised passwords within an organization.

Cybercriminals will typically avoid brute-forcing hashing algorithms for the reasons stated. They would much rather target low-hanging fruit, such as Active Directory passwords that are highly likely to have already been compromised. Moreover, blocking users from password reuse only increases the argument for comprehensive password security protocols within the business world. Indeed, hashing algorithms should be leveraged proactively to mitigate the risks associated with compromised credentials.

Forging Resilience with Password Security

The cybersecurity landscape is continually evolving, mainly with cybercriminals trying to cause havoc and disruption at the expense of organizations and the wider workforce. Businesses should fortify password defenses using a multifaceted approach to stand a chance. One that leverages bcrypt hashing to prevent brute force attacks, with increased user security awareness on password hygiene and stricter organizational policies to prevent the risk of password reuse. This fusion of technological fortifications, user education, and policy enforcement will reduce the likelihood of password compromise and improve the business’s overall cyber resilience.

How well do you understand bcrypt’s role in password security? Let us know on FacebookOpens a new window , XOpens a new window , and LinkedInOpens a new window . We’d love to hear from you!

Image Source: Shutterstock

MORE ON PASSWORD SECURITY

  • World Password Day or Passwordless Day?
  • Top Ways to Secure Active Directory From Password Attacks
  • Why Businesses Can’t Sleep on Password Attacks
  • Dashlane vs. 1Password: Comparison of Password Managers
  • IronVest vs. 1Password: A Comprehensive Password Manager Comparison
How Tough Is Bcrypt To Crack? Can It Keep Passwords Safe? - Spiceworks (2024)

FAQs

How Tough Is Bcrypt To Crack? Can It Keep Passwords Safe? - Spiceworks? ›

Can bcrypt hashing prevent password compromise? In short, no. While it offers a way to protect stored passwords from being guessed, HaveIBeenPwned has many examples where bcrypt hashes been exposed via data breaches.

Is bcrypt safe for passwords? ›

Renowned for its formidable defense in preserving stored passwords, bcrypt, stemming from the 1999 Blowfish cipher algorithm, has evolved into a bastion of password security. Nevertheless, in tandem with technological progress, the prowess of attackers also advances.

Is bcrypt secure in 2024? ›

MD5 reigned supreme for several years but bcrypt was in the lead in 2020, 2021, 2023 and again so far in 2024. Password storage solutions like LastPass, 1Password, and Bitwarden use the hashing approach called PBKDF2 salted with a strong hash alternative to MD5, called SHA-256. Even NIST recommends PBKDF2 SHA-256.

Can bcrypt passwords be decrypted? ›

How to decrypt an encrypted password in Mendix app set to bcrypt? You cannot do this because: Passwords are hashed, not encrypted. Hashing is one way only, you cannot reverse it.

What are the limitations of bcrypt? ›

BCrypt hashed passwords and secrets have a 72 character limit.

What are the drawbacks of bcrypt? ›

Time taken to crack bcrypt hashed passwords

Even with higher computer speeds, bcrypt is very time-consuming to hack via brute force thanks to its variable number of password iterations. Compare this to popular hashing algorithms such as MD5 and SHA256, which are designed to hash quickly.

Is bcrypt cryptographically secure? ›

Is bcrypt safe for password hashing? Bcrypt is a safe cryptographic algorithm for hashing and storing passwords.

What is the better alternative to bcrypt? ›

While there are of course deeper nuances to Argon2, bcrypt, and scrypt, the choice between them boils down to weighing computing and time requirements against memory hardness and parameter number. Argon2 is a great memory-hard password hashing algorithm, which makes it good for offline key derivation.

Is bcrypt still the best? ›

This shows that bcrypt is not impervious to breaches. However, it still stands tall amongst all others, especially regarding password protection and preventing reused credentials and compromised passwords within an organization.

How long does it take to crack a password in 2024? ›

A simple eight-character password can be cracked in only 37 seconds using brute force but it takes over a century to crack a 16-character one.

What level of encryption is bcrypt? ›

Bcrypt uses a 128-bit salt and encrypts a 192-bit magic value. It takes advantage of the expensive key setup in eksblowfish.

How do hackers find hashed passwords? ›

Once the attacker gains access to the compromised account with the stolen credentials, they may use various techniques to extract password hashes. They may scrape the active memory of the compromised system or explore system files and configuration settings to find valid password hashes.

Can hashed passwords be unhashed? ›

The data that is hashed cannot be practically "unhashed". Commonly used hashing algorithms include Message Digest (MDx) algorithms, such as MD5, and Secure Hash Algorithms (SHA), such as SHA-1 and the SHA-2 family that includes the widely used SHA-256 algorithm.

How long can a bcrypt password be hashed? ›

bcrypt has a maximum length input length of 72 bytes for most implementations, so you should enforce a maximum password length of 72 bytes (or less if the bcrypt implementation in use has smaller limits).

Is bcrypt better than SHA-256? ›

The technology in the Bcrypt algorithm and process limits attacks and makes it harder for attackers to compromise passwords. Bcrypt was not designed for encrypting large amounts of data. It is best implemented for passwords, however SHA-256 is better for large amounts of data because it is less costly and faster.

What is the strength of bcrypt password encoder? ›

Class BCryptPasswordEncoder

Clients can optionally supply a "version" ($2a, $2b, $2y) and a "strength" (a.k.a. log rounds in BCrypt) and a SecureRandom instance. The larger the strength parameter the more work will have to be done (exponentially) to hash the passwords. The default value is 10.

What is the safest password hashing algorithm? ›

To protect passwords, experts suggest using a strong and slow hashing algorithm like Argon2 or Bcrypt, combined with salt (or even better, with salt and pepper). (Basically, avoid faster algorithms for this usage.) To verify file signatures and certificates, SHA-256 is among your best hashing algorithm choices.

Is bcrypt deprecated? ›

bcrypt-nodejs is deprecated and throws a warning on install #8903.

What is the safest app for passwords? ›

Our Picks
  • See at Bitwarden. Best overall password manager. Bitwarden. ...
  • See at 1Password. Best premium password manager. 1Password. ...
  • See at Keeper Security. Best password manager for offline vault access. ...
  • See at NordPass. Best password manager for large file attachments. ...
  • See at Dashlane. Best password manager for large families.
Jul 30, 2024

What is the best algorithm to encrypt passwords? ›

Recommended encryption algorithms
  • SHA-2. SHA-2 is a family of hash functions widely employed for password encryption and other security applications due to their high level of security. ...
  • Bcrypt. ...
  • PBKDF2. ...
  • Argon2.
Apr 24, 2023

Top Articles
SWIFT Money Transfer - What Is It? & How It Works?
The Best CoinTracking Alternative | Coinpanda
Funny Roblox Id Codes 2023
Pinellas County Jail Mugshots 2023
Www.megaredrewards.com
Unraveling The Mystery: Does Breckie Hill Have A Boyfriend?
Needle Nose Peterbilt For Sale Craigslist
United Dual Complete Providers
Mlifeinsider Okta
What is a basic financial statement?
Jscc Jweb
Hallelu-JaH - Psalm 119 - inleiding
Cvs Learnet Modules
MindWare : Customer Reviews : Hocus Pocus Magic Show Kit
Dumb Money
Citymd West 146Th Urgent Care - Nyc Photos
United Dual Complete Providers
Insidekp.kp.org Hrconnect
Fairy Liquid Near Me
"Une héroïne" : les funérailles de Rebecca Cheptegei, athlète olympique immolée par son compagnon | TF1 INFO
Fraction Button On Ti-84 Plus Ce
Airrack hiring Associate Producer in Los Angeles, CA | LinkedIn
Yard Goats Score
If you bought Canned or Pouched Tuna between June 1, 2011 and July 1, 2015, you may qualify to get cash from class action settlements totaling $152.2 million
Gayla Glenn Harris County Texas Update
Academy Sports Meridian Ms
Craigslist Maryland Trucks - By Owner
Macu Heloc Rate
Helpers Needed At Once Bug Fables
SOGo Groupware - Rechenzentrum Universität Osnabrück
Possum Exam Fallout 76
Ancestors The Humankind Odyssey Wikia
Gasbuddy Lenoir Nc
O'reilly Auto Parts Ozark Distribution Center Stockton Photos
Scioto Post News
Diana Lolalytics
Kelsey Mcewen Photos
PA lawmakers push to restore Medicaid dental benefits for adults
The 50 Best Albums of 2023
Edict Of Force Poe
World History Kazwire
Convenient Care Palmer Ma
Fetus Munchers 1 & 2
Bcy Testing Solution Columbia Sc
Walmart Pharmacy Hours: What Time Does The Pharmacy Open and Close?
Coroner Photos Timothy Treadwell
705 Us 74 Bus Rockingham Nc
Oakley Rae (Social Media Star) – Bio, Net Worth, Career, Age, Height, And More
American Bully Puppies for Sale | Lancaster Puppies
Sinai Sdn 2023
Rheumatoid Arthritis Statpearls
Philasd Zimbra
Latest Posts
Article information

Author: Arline Emard IV

Last Updated:

Views: 6051

Rating: 4.1 / 5 (72 voted)

Reviews: 95% of readers found this page helpful

Author information

Name: Arline Emard IV

Birthday: 1996-07-10

Address: 8912 Hintz Shore, West Louie, AZ 69363-0747

Phone: +13454700762376

Job: Administration Technician

Hobby: Paintball, Horseback riding, Cycling, Running, Macrame, Playing musical instruments, Soapmaking

Introduction: My name is Arline Emard IV, I am a cheerful, gorgeous, colorful, joyous, excited, super, inquisitive person who loves writing and wants to share my knowledge and understanding with you.