Générateur de Hash Bcrypt
Hachez des mots de passe avec bcrypt et vérifiez les hashes
Higher rounds = more secure but slower. 10-12 is recommended.
About Bcrypt
Bcrypt is a password-hashing function based on the Blowfish cipher. It incorporates a salt to protect against rainbow table attacks and uses an adaptive cost factor to remain resistant to brute-force attacks as hardware improves.
Outils Associés
Generateur de Hash
Generer des empreintes SHA-1, SHA-256, SHA-384, SHA-512
Generateur de mots de passe
Generer des mots de passe aleatoires forts et securises
Décodeur JWT
Décoder et inspecter les JSON Web Tokens
Générateur HMAC
Générez des signatures HMAC avec SHA-256, SHA-384 ou SHA-512
Générateur de Token / Secret
Générez des tokens aléatoires, des clés API et des secrets dans divers formats
Formateur JSON
Embellir, minifier et valider les donnees JSON
Comment utiliser
Collez ou saisissez du texte
Entrez votre texte, code ou données dans la zone de saisie.
Choisissez les options
Sélectionnez la transformation ou le format que vous souhaitez appliquer.
Copiez le résultat
Copiez la sortie dans votre presse-papiers en un clic.
Pourquoi utiliser cet outil
100 % Gratuit
Aucun coût caché, aucun niveau premium — chaque fonctionnalité est gratuite.
Aucune installation
Fonctionne entièrement dans votre navigateur. Aucun logiciel à télécharger ou installer.
Privé et sécurisé
Vos données ne quittent jamais votre appareil. Rien n'est envoyé sur un serveur.
Fonctionne sur mobile
Entièrement adaptatif — utilisez-le sur votre téléphone, tablette ou ordinateur.
Bcrypt Password Hashing: Secure Storage Best Practices
Key Takeaways
- Bcrypt is a password hashing function designed to be deliberately slow, making brute-force attacks computationally expensive.
- The cost factor (work factor) controls how many iterations bcrypt performs — increasing it doubles the computation time with each increment.
- All bcrypt hashing runs in your browser — your passwords are never transmitted to any server.
Storing passwords as plain text or simple hashes is a critical security failure. Bcrypt was specifically designed for password hashing, incorporating a built-in salt and an adjustable cost factor that makes it resistant to brute-force and rainbow table attacks. It remains one of the most recommended password hashing algorithms alongside Argon2 and scrypt.
A bcrypt hash with cost factor 12 takes approximately 250ms to compute — making brute-force attacks against millions of passwords impractical.
Computational Cost
Key Concepts
Built-in Salt
Bcrypt automatically generates and embeds a 128-bit random salt in each hash. This means identical passwords produce different hashes, defeating rainbow table attacks entirely.
Cost Factor (Work Factor)
The cost factor determines the number of iterations (2^cost). A cost of 10 means 1,024 rounds. Each increment doubles computation time. Current recommendation is 10–12 for web applications.
Hash Format
Bcrypt hashes follow the format $2b$cost$salt+hash — the algorithm version ($2b$), cost factor, 22-character salt, and 31-character hash are all encoded in the 60-character output string.
Bcrypt vs. Other Algorithms
Bcrypt is CPU-hard but not memory-hard. Argon2 (the Password Hashing Competition winner) adds memory hardness. Scrypt adds both memory and CPU hardness. For most web applications, bcrypt remains a solid choice.
Pro Tips
Use a cost factor of at least 10 (ideally 12) — benchmark on your hardware and choose a cost that takes 200–500ms per hash.
Bcrypt truncates passwords at 72 bytes — for longer passwords, pre-hash with SHA-256 before passing to bcrypt.
Never implement your own bcrypt — use well-tested libraries like bcryptjs (JavaScript) or bcrypt (Python, Ruby, Go).
Increase the cost factor periodically as hardware gets faster — rehash passwords on next login when upgrading.
All bcrypt hash generation is performed entirely in your browser. Your passwords are never transmitted to any server. Note: browser-based bcrypt is slower than native implementations — this tool is intended for testing and education.