Here you will find daily news and tutorials about R, contributed by over 750 bloggers.
There are many ways to follow us - By e-mail:On Facebook: If you are an R blogger yourself you are invited to add your own R content feed to this site (Non-English R bloggers should add themselves- here)

(This article was first published on OpenCPU, and kindly contributed to R-bloggers)

The new package bcrypt provides an R interface to the OpenBSD ‘blowfish’ password hashing algorithm described in A Future-Adaptable Password Scheme by Niels Provos. The implementation is derived from the py-bcrypt module for Python which is a wrapper for the OpenBSD implementation.

Bcrypt is used for secure password hashing. The main difference with regular digest algorithms such as md5 / sha256 is that the bcrypt algorithm is specifically designed to be cpu intensive in order to protect against brute force attacks. This means that hasing with bcrypt is terribly slow, which is a feature. The complexity of the algorithm is configurable via the log_rounds parameter.

The API from the R package is exactly the same as the one from python: the hashpw function calculates a hash from a password using a random salt. Validating the hash is done by reshashing the password using the hash as a salt.

# Secret message as a string
passwd <-"supersecret"# Create the hash
hash <- hashpw(passwd)
hash
## [1] "$2a$12$1G8N3Xnp11oHt0RJf7SCMeWib7DpEOgpE5lXwjE2BATHJqFFxci6u"# To validate the hashidentical(hash, hashpw(passwd, hash))## TRUE# Wrapper that does the same
checkpw(passwd, hash)## TRUE

The gensalt function generates a salt for use with hashpw and specifies the complexity of the algorithm via the log_rounds parameter. The first few characters in the salt string hold the bcrypt version and value for log_rounds. The remainder stores 16 bytes of base64 encoded randomness for seeding the hashing algorithm.

# Use varying complexity:
hash11 <- hashpw(passwd, gensalt(11))
hash12 <- hashpw(passwd, gensalt(12))
hash13 <- hashpw(passwd, gensalt(13))# Takes longer to verify (or crack)system.time(checkpw(passwd, hash11))## user system elapsed ## 0.155 0.000 0.156 system.time(checkpw(passwd, hash12))## user system elapsed ## 0.312 0.000 0.312 system.time(checkpw(passwd, hash13))## user system elapsed ## 0.640 0.002 0.642

Related

To leave a comment for the author, please follow the link and comment on their blog: OpenCPU.