Botan 3.6.1
Crypto and TLS for C&
bcrypt.h
Go to the documentation of this file.
1/*
2* Bcrypt Password Hashing
3* (C) 2011 Jack Lloyd
4*
5* Botan is released under the Simplified BSD License (see license.txt)
6*/
7
8#ifndef BOTAN_BCRYPT_H_
9#define BOTAN_BCRYPT_H_
10
11#include <botan/types.h>
12#include <string>
13
14namespace Botan {
15
16class RandomNumberGenerator;
17
18/**
19* Create a password hash using Bcrypt
20*
21* Takes the @p password to hash, a @p rng, and a @p work_factor. The resulting
22* password hash is returned as a string.
23*
24* Higher work factors increase the amount of time the algorithm runs, increasing
25* the cost of cracking attempts. The increase is exponential, so a work factor
26* of 12 takes roughly twice as long as work factor 11. The default work factor
27* was set to 10 up until the 2.8.0 release.
28*
29* It is recommended to set the work factor as high as your system can tolerate
30* (from a performance and latency perspective) since higher work factors greatly
31* improve the security against GPU-based attacks. For example, for protecting
32* high value administrator passwords, consider using work factor 15 or 16; at
33* these work factors each bcrypt computation takes several seconds. Since admin
34* logins will be relatively uncommon, it might be acceptable for each login
35* attempt to take some time. As of 2018, a good password cracking rig (with 8
36* NVIDIA 1080 cards) can attempt about 1 billion bcrypt computations per month
37* for work factor 13. For work factor 12, it can do twice as many. For work
38* factor 15, it can do only one quarter as many attempts.
39*
40* Due to bugs affecting various implementations of bcrypt, several different
41* variants of the algorithm are defined. As of 2.7.0 Botan supports generating
42* (or checking) the 2a, 2b, and 2y variants. Since Botan has never been
43* affected by any of the bugs which necessitated these version upgrades, all
44* three versions are identical beyond the version identifier. Which variant to
45* use is controlled by the @p version argument.
46*
47* The bcrypt @p work_factor must be at least 4 (though at this work factor
48* bcrypt is not very secure). The bcrypt format allows up to 31, but Botan
49* currently rejects all work factors greater than 18 since even that work factor
50* requires roughly 15 seconds of computation on a fast machine.
51*
52* @warning The password is truncated at at most 72 characters; characters after
53* that do not have any effect on the resulting hash. To support longer
54* passwords, consider pre-hashing the password, for example by using
55* the hex encoding of SHA-256 of the password as the input to bcrypt.
56*
57* @param password the password.
58* @param rng a random number generator
59* @param work_factor how much work to do to slow down guessing attacks
60* @param version which version to emit (may be 'a', 'b', or 'y' all of which
61* have identical behavior in this implementation).
62*
63* @see https://www.usenix.org/events/usenix99/provos/provos_html/
64*
65* TODO(Botan4) Convert work_factor to a size_t
66*/
67std::string BOTAN_PUBLIC_API(2, 0) generate_bcrypt(std::string_view password,
68 RandomNumberGenerator& rng,
69 uint16_t work_factor = 12,
70 char version = 'a');
71
72/**
73* Check a previously created password hash
74*
75* Takes a @p password and a bcrypt @p hash and returns true if the password is
76* the same as the one that was used to generate the bcrypt hash.
77*
78* @param password the password to check against
79* @param hash the stored hash to check against
80*/
81bool BOTAN_PUBLIC_API(2, 0) check_bcrypt(std::string_view password, std::string_view hash);
82
83} // namespace Botan
84
85#endif
#define BOTAN_PUBLIC_API(maj, min)
Definition compiler.h:31
std::string generate_bcrypt(std::string_view pass, RandomNumberGenerator &rng, uint16_t work_factor, char version)
Definition bcrypt.cpp:144
bool check_bcrypt(std::string_view pass, std::string_view hash)
Definition bcrypt.cpp:159