bcrypt vs crypto-js vs md5 vs sha1 vs sha256
Secure Hashing and Cryptography in JavaScript
bcryptcrypto-jsmd5sha1sha256Similar Packages:

Secure Hashing and Cryptography in JavaScript

These libraries provide cryptographic functions for hashing data within JavaScript applications. bcrypt is designed for password hashing with built-in salting, typically used on servers. crypto-js offers a comprehensive suite of algorithms including SHA, MD5, and AES for both browser and Node.js environments. The md5, sha1, and sha256 packages are single-purpose utilities focused on specific hashing algorithms. While they share the goal of transforming data into fixed-size strings, their security strengths and intended environments differ significantly.

Npm Package Weekly Downloads Trend

3 Years

Github Stars Ranking

Stat Detail

Package
Downloads
Stars
Size
Issues
Publish
License
bcrypt07,7831.11 MB32a year agoMIT
crypto-js016,398487 kB2782 years agoMIT
md5091421.4 kB13-BSD-3-Clause
sha10107-011 years agoBSD-3-Clause
sha256048-411 years ago-

Secure Hashing in JavaScript: Architecture and Risks

Choosing the right hashing library is critical for application security. While bcrypt, crypto-js, md5, sha1, and sha256 all transform data into fixed-length strings, they serve different purposes and carry different risks. Let's break down how they handle security, environment compatibility, and real-world usage.

πŸ”’ Algorithm Security: Broken vs. Strong

Not all hashing algorithms are safe for security tasks. Some have known weaknesses that allow attackers to reverse-engineer data.

md5 produces a 128-bit hash but is cryptographically broken.

  • Collisions can be generated easily.
  • Never use for passwords or security tokens.
// md5: Fast but insecure
const hash = md5("user_password");
// Output: 5f4dcc3b5aa765d61d8327deb882cf99
// ⚠️ Do not use for security

sha1 produces a 160-bit hash and is also considered broken.

  • Major organizations have deprecated it for certificates.
  • Avoid for any new security-sensitive features.
// sha1: Deprecated for security
const hash = sha1("user_password");
// Output: 5baa61e4c9b93f3f0682250b6cf8331b7ee68fd8
// ⚠️ Do not use for security

sha256 produces a 256-bit hash and is currently secure for integrity.

  • Resistant to collision attacks.
  • Good for data verification but not password storage.
// sha256: Secure for integrity
const hash = sha256("user_password");
// Output: ef92b778bafe771e89245b89ecbc08a44a4e166c06659911881f383d4473e94f
// βœ… Safe for checksums

bcrypt is designed specifically for passwords.

  • Includes salting and cost factors to slow down attacks.
  • The only choice here for credential storage.
// bcrypt: Secure for passwords
const hash = bcrypt.hashSync("user_password", 10);
// Output: $2b$10$N9qo8uLOickgx2ZMRZoMyeIjZAgcfl7p92ldGxad68LJZdL17lhWy
// βœ… Safe for credentials

crypto-js supports multiple algorithms including SHA256.

  • Allows you to switch algorithms within the same library.
  • Secure when using SHA256 or stronger options.
// crypto-js: Flexible security
const hash = CryptoJS.SHA256("user_password").toString();
// Output: ef92b778bafe771e89245b89ecbc08a44a4e166c06659911881f383d4473e94f
// βœ… Safe for checksums

πŸ–₯️ Environment Compatibility: Native vs. Pure JavaScript

Where your code runs matters. Some packages require Node.js-specific features that break in browsers.

bcrypt relies on native C++ bindings.

  • Requires compilation via node-gyp.
  • Does not work in browsers without complex bundler configurations.
// bcrypt: Node.js only
const bcrypt = require('bcrypt');
// ❌ Will fail in browser environments

crypto-js is written in pure JavaScript.

  • Works in Node.js and all modern browsers.
  • No compilation steps needed.
// crypto-js: Universal
const CryptoJS = require("crypto-js");
// βœ… Works everywhere

md5, sha1, and sha256 are typically pure JavaScript.

  • Lightweight and easy to bundle.
  • Safe for client-side integration.
// sha256: Universal
const hash = sha256("data");
// βœ… Works everywhere

πŸ› οΈ API Simplicity: Single Purpose vs. Suite

Developer experience varies between single-function packages and comprehensive suites.

md5, sha1, and sha256 offer direct function calls.

  • Minimal setup required.
  • Easy to read and understand.
// Single purpose packages
const hash1 = md5("data");
const hash2 = sha1("data");
const hash3 = sha256("data");

crypto-js uses a namespace object.

  • Requires importing specific modules or the whole suite.
  • More verbose but consistent across algorithms.
// crypto-js suite
const hash = CryptoJS.SHA256("data").toString(CryptoJS.enc.Hex);

bcrypt uses async or sync methods with salt rounds.

  • Requires configuring cost factors.
  • More complex but necessary for security.
// bcrypt configuration
const hash = bcrypt.hashSync("data", 10); // 10 salt rounds

⚠️ Critical Security Warning: Client-Side Hashing

A common mistake is hashing passwords in the browser before sending them to the server.

  • Never hash passwords on the client.
  • It exposes the hashing logic to attackers.
  • It does not replace HTTPS or server-side hashing.
// ❌ Bad Pattern: Client-side password hashing
const hash = sha256(password);
sendToServer(hash); 
// Attacker can intercept hash and replay it

// βœ… Good Pattern: Send over HTTPS, hash on server
sendToServer(password); 
// Server uses bcrypt to hash securely

πŸ“Š Summary: Algorithm Strength

PackageAlgorithmSecurity StatusBest Use Case
md5MD5πŸ”΄ BrokenLegacy checksums
sha1SHA1πŸ”΄ BrokenLegacy checksums
sha256SHA256🟒 SecureData integrity
crypto-jsMultiple🟒 SecureGeneral crypto
bcryptBcrypt🟒 SecurePassword storage

πŸ“Š Summary: Environment Support

PackageBrowserNode.jsNative Deps
md5βœ…βœ…βŒ
sha1βœ…βœ…βŒ
sha256βœ…βœ…βŒ
crypto-jsβœ…βœ…βŒ
bcryptβŒβœ…βœ…

πŸ’‘ The Big Picture

bcrypt is the only choice for passwords β€” but keep it on the server. It slows down attackers and handles salting automatically.

crypto-js is the best all-rounder for frontend tasks. It handles SHA256 and other algorithms without native dependencies.

md5 and sha1 should be avoided for security. Use them only for non-critical checksums or legacy support.

sha256 is great for data integrity. It is fast and secure for verifying files or public data.

Final Thought: Security starts with architecture. Never trust client-side hashing for protection. Use HTTPS, hash passwords on the server with bcrypt, and use crypto-js or sha256 for public data integrity.

How to Choose: bcrypt vs crypto-js vs md5 vs sha1 vs sha256

  • bcrypt:

    Choose bcrypt only for server-side password hashing where security is critical. It is not suitable for frontend use due to native dependencies and the risk of exposing hashing logic to clients. Use this when you need industry-standard protection for user credentials stored in a database.

  • crypto-js:

    Choose crypto-js if you need a versatile, pure JavaScript library that works in both browsers and Node.js. It is ideal for projects requiring multiple algorithms like SHA256 or AES without native bindings. Use this for client-side integrity checks or non-sensitive data encryption.

  • md5:

    Choose md5 only for non-security purposes like file integrity checks or legacy system compatibility. Do not use it for passwords or security tokens because the algorithm is cryptographically broken. It is suitable when you need a quick checksum for data that does not require protection.

  • sha1:

    Choose sha1 only for legacy compatibility or non-critical checksums where collision resistance is not a concern. Like MD5, it is considered insecure for modern security needs. Use this only if you are maintaining older systems that specifically require SHA1 output.

  • sha256:

    Choose sha256 for generating secure checksums or hashes where performance and standard compliance matter. It is safer than MD5 or SHA1 but still not suitable for password storage on its own. Use this for verifying data integrity or creating unique identifiers for public data.

README for bcrypt

node.bcrypt.js

ci

Build Status

A library to help you hash passwords.

You can read about bcrypt in Wikipedia as well as in the following article: How To Safely Store A Password

If You Are Submitting Bugs or Issues

Please verify that the NodeJS version you are using is a stable version; Unstable versions are currently not supported and issues created while using an unstable version will be closed.

If you are on a stable version of NodeJS, please provide a sufficient code snippet or log files for installation issues. The code snippet does not require you to include confidential information. However, it must provide enough information so the problem can be replicable, or it may be closed without an explanation.

Version Compatibility

Please upgrade to atleast v5.0.0 to avoid security issues mentioned below.

Node VersionBcrypt Version
0.4<= 0.4
0.6, 0.8, 0.10>= 0.5
0.11>= 0.8
4<= 2.1.0
8>= 1.0.3 < 4.0.0
10, 11>= 3
12 onwards>= 3.0.6

node-gyp only works with stable/released versions of node. Since the bcrypt module uses node-gyp to build and install, you'll need a stable version of node to use bcrypt. If you do not, you'll likely see an error that starts with:

gyp ERR! stack Error: "pre" versions of node cannot be installed, use the --nodedir flag instead

Security Issues And Concerns

Per bcrypt implementation, only the first 72 bytes of a string are used. Any extra bytes are ignored when matching passwords. Note that this is not the first 72 characters. It is possible for a string to contain less than 72 characters, while taking up more than 72 bytes (e.g. a UTF-8 encoded string containing emojis). If a string is provided, it will be encoded using UTF-8.

As should be the case with any security tool, anyone using this library should scrutinise it. If you find or suspect an issue with the code, please bring it to the maintainers' attention. We will spend some time ensuring that this library is as secure as possible.

Here is a list of BCrypt-related security issues/concerns that have come up over the years.

  • An issue with passwords was found with a version of the Blowfish algorithm developed for John the Ripper. This is not present in the OpenBSD version and is thus not a problem for this module. HT zooko.
  • Versions < 5.0.0 suffer from bcrypt wrap-around bug and will truncate passwords >= 255 characters leading to severely weakened passwords. Please upgrade at earliest. See this wiki page for more details.
  • Versions < 5.0.0 do not handle NUL characters inside passwords properly leading to all subsequent characters being dropped and thus resulting in severely weakened passwords. Please upgrade at earliest. See this wiki page for more details.

Compatibility Note

This library supports $2a$ and $2b$ prefix bcrypt hashes. $2x$ and $2y$ hashes are specific to bcrypt implementation developed for John the Ripper. In theory, they should be compatible with $2b$ prefix.

Compatibility with hashes generated by other languages is not 100% guaranteed due to difference in character encodings. However, it should not be an issue for most cases.

Migrating from v1.0.x

Hashes generated in earlier version of bcrypt remain 100% supported in v2.x.x and later versions. In most cases, the migration should be a bump in the package.json.

Hashes generated in v2.x.x using the defaults parameters will not work in earlier versions.

Dependencies

  • NodeJS
  • node-gyp
  • Please check the dependencies for this tool at: https://github.com/nodejs/node-gyp
  • Windows users will need the options for c# and c++ installed with their visual studio instance.
  • Python 2.x/3.x
  • OpenSSL - This is only required to build the bcrypt project if you are using versions <= 0.7.7. Otherwise, we're using the builtin node crypto bindings for seed data (which use the same OpenSSL code paths we were, but don't have the external dependency).

Install via NPM

npm install bcrypt

Note: OS X users using Xcode 4.3.1 or above may need to run the following command in their terminal prior to installing if errors occur regarding xcodebuild: sudo xcode-select -switch /Applications/Xcode.app/Contents/Developer

Pre-built binaries for various NodeJS versions are made available on a best-effort basis.

Only the current stable and supported LTS releases are actively tested against.

There may be an interval between the release of the module and the availabilty of the compiled modules.

Currently, we have pre-built binaries that support the following platforms:

  1. Windows x32 and x64
  2. Linux x64 (GlibC and musl)
  3. macOS

If you face an error like this:

node-pre-gyp ERR! Tried to download(404): https://github.com/kelektiv/node.bcrypt.js/releases/download/v1.0.2/bcrypt_lib-v1.0.2-node-v48-linux-x64.tar.gz

make sure you have the appropriate dependencies installed and configured for your platform. You can find installation instructions for the dependencies for some common platforms in this page.

Usage

async (recommended)

const bcrypt = require('bcrypt');
const saltRounds = 10;
const myPlaintextPassword = 's0/\/\P4$$w0rD';
const someOtherPlaintextPassword = 'not_bacon';

To hash a password:

Technique 1 (generate a salt and hash on separate function calls):

bcrypt.genSalt(saltRounds, function(err, salt) {
    bcrypt.hash(myPlaintextPassword, salt, function(err, hash) {
        // Store hash in your password DB.
    });
});

Technique 2 (auto-gen a salt and hash):

bcrypt.hash(myPlaintextPassword, saltRounds, function(err, hash) {
    // Store hash in your password DB.
});

Note that both techniques achieve the same end-result.

To check a password:

// Load hash from your password DB.
bcrypt.compare(myPlaintextPassword, hash, function(err, result) {
    // result == true
});
bcrypt.compare(someOtherPlaintextPassword, hash, function(err, result) {
    // result == false
});

A Note on Timing Attacks

with promises

bcrypt uses whatever Promise implementation is available in global.Promise. NodeJS >= 0.12 has a native Promise implementation built in. However, this should work in any Promises/A+ compliant implementation.

Async methods that accept a callback, return a Promise when callback is not specified if Promise support is available.

bcrypt.hash(myPlaintextPassword, saltRounds).then(function(hash) {
    // Store hash in your password DB.
});
// Load hash from your password DB.
bcrypt.compare(myPlaintextPassword, hash).then(function(result) {
    // result == true
});
bcrypt.compare(someOtherPlaintextPassword, hash).then(function(result) {
    // result == false
});

This is also compatible with async/await

async function checkUser(username, password) {
    //... fetch user from a db etc.

    const match = await bcrypt.compare(password, user.passwordHash);

    if(match) {
        //login
    }

    //...
}

ESM import

import bcrypt from "bcrypt";

// later
await bcrypt.compare(password, hash);

sync

const bcrypt = require('bcrypt');
const saltRounds = 10;
const myPlaintextPassword = 's0/\/\P4$$w0rD';
const someOtherPlaintextPassword = 'not_bacon';

To hash a password:

Technique 1 (generate a salt and hash on separate function calls):

const salt = bcrypt.genSaltSync(saltRounds);
const hash = bcrypt.hashSync(myPlaintextPassword, salt);
// Store hash in your password DB.

Technique 2 (auto-gen a salt and hash):

const hash = bcrypt.hashSync(myPlaintextPassword, saltRounds);
// Store hash in your password DB.

As with async, both techniques achieve the same end-result.

To check a password:

// Load hash from your password DB.
bcrypt.compareSync(myPlaintextPassword, hash); // true
bcrypt.compareSync(someOtherPlaintextPassword, hash); // false

A Note on Timing Attacks

Why is async mode recommended over sync mode?

We recommend using async API if you use bcrypt on a server. Bcrypt hashing is CPU intensive which will cause the sync APIs to block the event loop and prevent your application from servicing any inbound requests or events. The async version uses a thread pool which does not block the main event loop.

API

BCrypt.

  • genSaltSync(rounds, minor)
    • rounds - [OPTIONAL] - the cost of processing the data. (default - 10)
    • minor - [OPTIONAL] - minor version of bcrypt to use. (default - b)
  • genSalt(rounds, minor, cb)
    • rounds - [OPTIONAL] - the cost of processing the data. (default - 10)
    • minor - [OPTIONAL] - minor version of bcrypt to use. (default - b)
    • cb - [OPTIONAL] - a callback to be fired once the salt has been generated. uses eio making it asynchronous. If cb is not specified, a Promise is returned if Promise support is available.
      • err - First parameter to the callback detailing any errors.
      • salt - Second parameter to the callback providing the generated salt.
  • hashSync(data, salt)
    • data - [REQUIRED] - the data to be encrypted.
    • salt - [REQUIRED] - the salt to be used to hash the password. if specified as a number then a salt will be generated with the specified number of rounds and used (see example under Usage).
  • hash(data, salt, cb)
    • data - [REQUIRED] - the data to be encrypted.
    • salt - [REQUIRED] - the salt to be used to hash the password. if specified as a number then a salt will be generated with the specified number of rounds and used (see example under Usage).
    • cb - [OPTIONAL] - a callback to be fired once the data has been encrypted. uses eio making it asynchronous. If cb is not specified, a Promise is returned if Promise support is available.
      • err - First parameter to the callback detailing any errors.
      • encrypted - Second parameter to the callback providing the encrypted form.
  • compareSync(data, encrypted)
    • data - [REQUIRED] - data to compare.
    • encrypted - [REQUIRED] - data to be compared to.
  • compare(data, encrypted, cb)
    • data - [REQUIRED] - data to compare.
    • encrypted - [REQUIRED] - data to be compared to.
    • cb - [OPTIONAL] - a callback to be fired once the data has been compared. uses eio making it asynchronous. If cb is not specified, a Promise is returned if Promise support is available.
      • err - First parameter to the callback detailing any errors.
      • same - Second parameter to the callback providing whether the data and encrypted forms match [true | false].
  • getRounds(encrypted) - return the number of rounds used to encrypt a given hash
    • encrypted - [REQUIRED] - hash from which the number of rounds used should be extracted.

A Note on Rounds

A note about the cost: when you are hashing your data, the module will go through a series of rounds to give you a secure hash. The value you submit is not just the number of rounds the module will go through to hash your data. The module will use the value you enter and go through 2^rounds hashing iterations.

From @garthk, on a 2GHz core you can roughly expect:

rounds=8 : ~40 hashes/sec
rounds=9 : ~20 hashes/sec
rounds=10: ~10 hashes/sec
rounds=11: ~5  hashes/sec
rounds=12: 2-3 hashes/sec
rounds=13: ~1 sec/hash
rounds=14: ~1.5 sec/hash
rounds=15: ~3 sec/hash
rounds=25: ~1 hour/hash
rounds=31: 2-3 days/hash

A Note on Timing Attacks

Because it's come up multiple times in this project and other bcrypt projects, it needs to be said. The bcrypt library is not susceptible to timing attacks. From codahale/bcrypt-ruby#42:

One of the desired properties of a cryptographic hash function is preimage attack resistance, which means there is no shortcut for generating a message which, when hashed, produces a specific digest.

A great thread on this, in much more detail can be found @ codahale/bcrypt-ruby#43

If you're unfamiliar with timing attacks and want to learn more you can find a great writeup @ A Lesson In Timing Attacks

However, timing attacks are real. And the comparison function is not time safe. That means that it may exit the function early in the comparison process. Timing attacks happen because of the above. We don't need to be careful that an attacker will learn anything, and our comparison function provides a comparison of hashes. It is a utility to the overall purpose of the library. If you end up using it for something else, we cannot guarantee the security of the comparator. Keep that in mind as you use the library.

Hash Info

The characters that comprise the resultant hash are ./ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789$.

Resultant hashes will be 60 characters long and they will include the salt among other parameters, as follows:

$[algorithm]$[cost]$[salt][hash]

  • 2 chars hash algorithm identifier prefix. "$2a$" or "$2b$" indicates BCrypt
  • Cost-factor (n). Represents the exponent used to determine how many iterations 2^n
  • 16-byte (128-bit) salt, base64 encoded to 22 characters
  • 24-byte (192-bit) hash, base64 encoded to 31 characters

Example:

$2b$10$nOUIs5kJ7naTuTFkBy1veuK0kSxUFXfuaOKdOKf9xYT0KKIGSJwFa
 |  |  |                     |
 |  |  |                     hash-value = K0kSxUFXfuaOKdOKf9xYT0KKIGSJwFa
 |  |  |
 |  |  salt = nOUIs5kJ7naTuTFkBy1veu
 |  |
 |  cost-factor => 10 = 2^10 rounds
 |
 hash-algorithm identifier => 2b = BCrypt

Testing

If you create a pull request, tests better pass :)

npm install
npm test

Credits

The code for this comes from a few sources:

Contributors

License

Unless stated elsewhere, file headers or otherwise, the license as stated in the LICENSE file.