Click here to Skip to main content
15,895,256 members
Please Sign up or sign in to vote.
0.00/5 (No votes)
See more:
I'm in the process of implementing Identity for access control on a .Net Core application.

How does its password hashing compare to Bcrypt and is there a case for replacing it with Bcrypt?

What I have tried:

NA, this is a request for opinions rather than assistance
Posted
Updated 12-Oct-18 3:50am

BCrypt is a hashing function!.
It's just deliberately slow to make it harder to brute force: Hashing in Action: Understanding bcrypt[^]
 
Share this answer
 
Comments
Ger Hayden 12-Oct-18 6:45am    
I'm happy with slow and the concept of faking the hash time in the event of an invalid username being provided to disguise that Bcrypt has not fired. Is it any better than the hashing that comes as standard with Identity?
In my opinion you are fine with using Identity the way it is; it is using PBKDF2+HMAC-SHA and most likely any flaws will be in the code using it as opposed to the algorithm itself.

You can read up on what Identity uses here:
Exploring the ASP.NET Core Identity PasswordHasher[^]
 
Share this answer
 

This content, along with any associated source code and files, is licensed under The Code Project Open License (CPOL)



CodeProject, 20 Bay Street, 11th Floor Toronto, Ontario, Canada M5J 2N8 +1 (416) 849-8900