← Back to all tools
Bcrypt Hash Generator
Hash and verify passwords using Bcrypt — the industry standard for secure password storage.
Bcrypt Password Hashing
ℹ
Bcrypt is designed for hashing passwords. Higher rounds = slower = more secure. Default of 10 is a good balance for most applications.
Output
Bcrypt hash or verification result will appear here…
Frequently Asked Questions
What is Bcrypt and why use it for passwords?
Bcrypt is a password hashing function designed to be slow, making brute-force attacks impractical. Unlike SHA-256 (fast by design), Bcrypt's adjustable cost factor lets you increase hashing time as hardware improves. Always use Bcrypt, Argon2, or PBKDF2 for passwords — never plain MD5 or SHA.
What cost factor should I use?
Cost 10 is recommended for most applications (~100ms per hash). Use 12 for high-security scenarios (~400ms). Use 4 for testing only. Increase the cost factor as hardware gets faster — re-hashing passwords at login time is the standard approach.
Why does the same password produce different hashes each time?
Bcrypt automatically generates a unique random salt for every hash. The salt is embedded in the hash output, so verification works without storing the salt separately. This prevents rainbow table attacks.
Is my password sent to a server?
No. All Bcrypt hashing runs entirely in your browser using the bcryptjs JavaScript library. Your passwords are never transmitted anywhere.
What is the maximum password length for Bcrypt?
Bcrypt silently truncates input at 72 bytes. If you need to hash longer passwords, pre-hash with SHA-256 first. This limitation is a known quirk of the original Bcrypt specification.
Should I use Bcrypt or Argon2?
Both are excellent choices. Argon2 (winner of the Password Hashing Competition) is newer and more resistant to GPU attacks. Bcrypt is battle-tested with 25+ years of use. If your platform supports Argon2, prefer it. Bcrypt is a solid fallback with wide library support.