public final class BCrypt
extends java.lang.Object
This implementation does not correspondent to the 1999 published paper "A Future-Adaptable Password Scheme" of Niels Provos and David Mazières, see: https://www.usenix.org/legacy/events/usenix99/provos/provos_html/node1.html. In contrast to the paper, the order of key setup and salt setup is reversed: state <- ExpandKey(state, 0, key) state <- ExpandKey(state, 0, salt) This corresponds to the OpenBSD reference implementation of Bcrypt.
Note: There is no successful cryptanalysis (status 2015), but the amount of memory and the band width of Bcrypt may be insufficient to effectively prevent attacks with custom hardware like FPGAs, ASICs
This implementation uses some parts of Bouncy Castle's BlowfishEngine.
Modifier and Type | Method and Description |
---|---|
static byte[] |
generate(byte[] password,
byte[] salt,
int cost)
Calculates the bcrypt hash of a password.
|
public static byte[] generate(byte[] password, byte[] salt, int cost)
This implements the raw bcrypt function as defined in the bcrypt specification, not the crypt encoded version implemented in OpenBSD.
password
- the password bytes (up to 72 bytes) to use for this invocation.salt
- the 128 bit salt to use for this invocation.cost
- the bcrypt cost parameter. The cost of the bcrypt function grows as
2^cost
. Legal values are 4..31 inclusive.