Password Hash Generator
Generate and verify secure password hashes using Bcrypt, Scrypt, and Argon2 algorithms
Bcrypt Options
Higher values are more secure but take longer. Recommended: 10-12
Result
About Password Hashing
Password hashing is a one-way encryption technique that converts user passwords into fixed-length strings. Unlike regular hashes, password hashing algorithms are specifically designed to resist brute-force attacks and rainbow table attacks.
Important: Never store plain text passwords! Always use password hashing algorithms (like Bcrypt, Scrypt, or Argon2) to store user passwords. These algorithms have built-in salt generation to effectively prevent rainbow table attacks.
Algorithm Comparison
| Algorithm | Year | Memory Usage | GPU Resistance | Recommended |
|---|---|---|---|---|
| Bcrypt | 1999 | 4KB | Medium | Yes |
| Scrypt | 2009 | Configurable | High | Yes |
| Argon2 | 2015 | Configurable | Very High | Best Choice |
About Bcrypt
Bcrypt is an adaptive password hashing function based on the Blowfish cipher, designed by Niels Provos and David Mazières in 1999. It includes a cost factor that can be increased as hardware performance improves, maintaining resistance to cracking. Bcrypt supports passwords up to 72 bytes and generates 60-character hashes with $2a$, $2b$, or $2y$ prefixes.
About Scrypt
Scrypt is a password derivation function designed by Colin Percival in 2009, specifically engineered as a memory-hard algorithm that requires significant memory to compute, effectively resisting ASIC and GPU parallel attacks. Scrypt is widely used in cryptocurrencies (like Litecoin) and password storage. Its parameters N, r, p can adjust CPU and memory costs.
About Argon2
Argon2 is the winner of the 2015 Password Hashing Competition and is considered the most secure password hashing algorithm currently available. It has three variants: Argon2d (GPU-resistant), Argon2i (side-channel resistant), and Argon2id (combining both, recommended for password hashing). Argon2 can configure memory, iterations, and parallelism parameters.
Password Storage Best Practices
- Use Argon2id as the first choice, or Bcrypt if unavailable
- Never store plain text passwords or use MD5/SHA for password hashing
- Use sufficiently high cost factors (Bcrypt ≥10, Argon2 memory ≥64MB)
- Regularly update hashing algorithms and parameters to keep up with hardware advances
- Implement password policies requiring users to use strong passwords