Add hash bcrypt#13318
Closed
kishore-144 wants to merge 1 commit intoTheAlgorithms:masterfrom
kishore-144:add-bcrypt
Closed
Add hash bcrypt#13318kishore-144 wants to merge 1 commit intoTheAlgorithms:masterfrom kishore-144:add-bcrypt
kishore-144 wants to merge 1 commit intoTheAlgorithms:masterfrom
kishore-144:add-bcrypt
Conversation
Closing this pull request as invalid@kishore-144, this pull request is being closed as none of the checkboxes have been marked. It is important that you go through the checklist and mark the ones relevant to this pull request. Please read the Contributing guidelines. If you're facing any problem on how to mark a checkbox, please read the following instructions:
NOTE: Only |
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Add this suggestion to a batch that can be applied as a single commit.This suggestion is invalid because no changes were made to the code.Suggestions cannot be applied while the pull request is closed.Suggestions cannot be applied while viewing a subset of changes.Only one suggestion per line can be applied in a batch.Add this suggestion to a batch that can be applied as a single commit.Applying suggestions on deleted lines is not supported.You must change the existing code in this line in order to create a valid suggestion.Outdated suggestions cannot be applied.This suggestion has been applied or marked resolved.Suggestions cannot be applied from pending reviews.Suggestions cannot be applied on multi-line comments.Suggestions cannot be applied while the pull request is queued to merge.Suggestion cannot be applied right now. Please check back later.
🧩 Add bcrypt Algorithm (Custom Implementation)
Summary
This PR introduces a bcrypt algorithm reimplementation built entirely from scratch in Python — without relying on external bcrypt libraries. The goal is to provide an educational yet functional version of the real bcrypt algorithm that demonstrates its internal structure, including the EksBlowfish key setup, salted key expansion, and configurable cost factor.
Key Details
Implements the core EksBlowfish logic (P-array, S-boxes, and Feistel network).
Supports variable cost rounds (2^cost), simulating bcrypt’s computational scaling.
Includes helper methods for hashing and verification (bcrypt_hash and bcrypt_check).
Cleanly written for readability, with developer comments explaining each major step.
No external dependencies — pure Python implementation.
Purpose
This PR aims to help developers understand how bcrypt works internally rather than using it as a black-box library. While it is not intended for production-grade security, it serves as a reference for studying password hashing and key expansion mechanisms.
Notes
-- Output format follows bcrypt-style structure for familiarity.
-- Future improvement: Optimize key schedule performance and integrate official test vectors for validation.