Next: Comparison
Up: A Future-Adaptable Password Scheme
Previous: Implementation
Because bcrypt has adjustable cost, we cannot meaningfully
evaluate the performance of the algorithm on its own. Instead, we
will place it in the context of two popular password hashing
functions. We describe various attacks and optimizations these
functions have undergone, and discuss the applicability of the same
techniques to bcrypt.
Niels Provos and David Mazieres
4/28/1999