How secure are bcrypt passwords and are they difficult to crack?

The persistent danger of cyberattacks underscores the critical imperative for businesses to prioritize the security of user passwords as a fundamental necessity. Despite this urgency, a comprehensive analysis of more than 800 million breached passwords reveals a disconcerting trend. Surprisingly, common basic terms like “password”, “admin”, “welcome” and “p@ssw0rd” are still among the most chosen passwords. Another surprising revelation is that passwords that are predominantly composed of lowercase letters make up a staggering 18.82% of those used in malicious attacks. This glaring reality underscores the vulnerability of passwords, perpetuating them as one of the weakest links within an organization's network defenses. As security teams face the perpetual challenge of thwarting unauthorized access and hardening against data breaches, the importance of strengthening this critical aspect of cybersecurity cannot be understated.

As a result, numerous security experts have extensively explored optimal methods for protecting passwords, especially focusing on fortified hashing algorithms, resulting in the dominance of bcrypt. Renowned for its formidable defense in preserving stored passwords, bcrypt, which emerged from the 1999 Blowfish encryption algorithm, has become a bastion of password security. However, along with technological progress, the skill of attackers also advances. Consequently, continued scrutiny of bcrpyt has revealed insights into its resilience amid the changing tactics of contemporary hackers.

Darren James

Senior Product Manager at Specops Software, an Outpost24 company.

Why we use hashing algorithms

scroll to top