Check out the new USENIX Web site. next up previous
Next: Comparison Up: A Future-Adaptable Password Scheme Previous: Implementation

Bcrypt Evaluation

 Because bcrypt has adjustable cost, we cannot meaningfully evaluate the performance of the algorithm on its own. Instead, we will place it in the context of two popular password hashing functions. We describe various attacks and optimizations these functions have undergone, and discuss the applicability of the same techniques to bcrypt.


Niels Provos and David Mazieres