Bcrypt Generator
Generate and verify bcrypt password hashes.
Frequently Asked Questions
What is bcrypt and why use it for passwords?
Bcrypt is a password hashing algorithm designed to be intentionally slow, making brute-force attacks impractical. Unlike fast hashes like MD5 or SHA-256 (which can check billions per second), bcrypt with a cost factor of 12 takes about 250ms per hash. This deliberate slowness is the key security feature for password storage.
What is the cost factor (salt rounds)?
The cost factor (also called work factor or salt rounds) determines how computationally expensive the hashing is. Each increment doubles the time: cost 10 takes ~100ms, cost 12 takes ~400ms, cost 14 takes ~1.6s. Higher cost = more security but slower login. Cost 10-12 is recommended for most applications in 2025.
Does bcrypt include a salt automatically?
Yes — bcrypt automatically generates a random 128-bit salt for each hash and embeds it in the output string. This means identical passwords produce different hashes every time. The salt is stored alongside the hash, so no separate salt storage is needed. This is a major advantage over manual salting.
How do I verify a password against a bcrypt hash?
Paste the bcrypt hash and the plaintext password into the verifier. It extracts the salt and cost factor from the hash, re-hashes the provided password with those same parameters, and compares the results. A match means the password is correct. This is the same process your server performs during login.
Is my password safe when using this tool?
Yes — all hashing and verification runs entirely in your browser. Your password and hash are never sent to any server. However, for production use, always perform password hashing on your server, not on the client side, to prevent attackers from bypassing the hash entirely.