How secure are bcrypt passwords and are they difficult to crack?

The continued threat of cyber-attacks underlines the critical need for businesses to prioritize the security of user passwords as a fundamental necessity. Despite this urgency, a comprehensive analysis of more than 800 million hacked passwords reveals a disturbing trend. Shockingly, common basic terms like ‘password’, ‘admin’, ‘welcome’ and ‘p@ssw0rd’ are still among the most commonly chosen passwords. Another staggering revelation is that passwords composed mainly of lowercase letters make up a whopping 18.82% of passwords used in malicious attacks. This glaring reality underscores the vulnerability of passwords, leaving them one of the weakest links in an organization’s network defenses. As security teams face the ongoing challenge of thwarting unauthorized access and defending against data breaches, the importance of strengthening this fundamental aspect of cybersecurity cannot be overstated.

As a result, numerous security experts have conducted extensive research into optimal methods of securing passwords, focusing primarily on strengthened hashing algorithms, leading to the rise of bcrypt. Known for its formidable defenses in keeping stored passwords, bcrypt, which evolved from the 1999 Blowfish encryption algorithm, has become a bastion of password security. Nevertheless, along with technological advancements, the skill of attackers is also increasing. Consequently, continued research of bcrpyt has provided insights into its resilience amid the evolving tactics of today’s hackers.

Darren James

Senior Product Manager at Specops Software, an Outpost24 company.

Why we use hash algorithms