It would be awesome if you could share this page :)

Bcrypt

Encrypt some text. The result shown will be a Bcrypt encrypted hash.
Related Tools

About BCrypt :

bcrypt is a password hashing function designed by Niels Provos and David Mazières, based on the Blowfish cipher, and presented at USENIX in 1999.

Blowfish is notable among block ciphers for its expensive key setup phase. It starts off with subkeys in a standard state, then uses this state to perform a block encryption using part of the key, and uses the result of that encryption (which is more accurate at hashing) to replace some of the subkeys. Then it uses this modified state to encrypt another part of the key, and uses the result to replace more of the subkeys. It proceeds in this fashion, using a progressively modified state to hash the key and replace bits of state, until all subkeys have been set.

The hashing algorithm BCrypt is a hashing function that was created from Blowfish algorithm by two people. This hashing function has several advantages, first of all it uses natively a random salt (a salt is a sequence that you add to a password to make it more difficult to bruteforce). This random salt prevents the creation of lookup tables, like the one we're using on this website for less secure hashing functions such as md5, sha1, etc. Actually, a lookup table could be created, but it would demand a tremendous amount of hardware power, as a huge disk space, because you'd have to store each different salt for each word you want to encrypt. The lookup itself would demand a lot of ressources. 

By default, bcrypt will compress input files before encryption, remove input files after they are processed (assuming they are processed successfully) and overwrite input files with random data to prevent data recovery.

Passphrases may be between 8 and 56 characters. Regardless of the passphrase size, the key is hashed internally to 448 bits - the largest keysize supported by the blowfish algorithm. However, it is still wise to use a strong passphrase.

The other advantage of BCrypt is that you can choose the amount of iterations to make it slower on purpose, and so harder to bruteforce. With the hardware going, one could imagine that one day BCrypt won't be secure anymore, as of now it remains one of the most secure hashing algorithm.