using Org.BouncyCastle.Crypto;
using Org.BouncyCastle.Crypto.Generators;
using Org.BouncyCastle.Security;
using Org.BouncyCastle.Crypto.Parameters;
public static void Main()
string hash = BCPasswordHash.CreateHash(pin);
Console.WriteLine("Verified: " + BCPasswordHash.ValidatePassword(pin, hash));
public class BCPasswordHash
public const int SALT_BYTE_SIZE = 32;
public const int SALT_BASE64_LENGTH = (SALT_BYTE_SIZE / 3 + (SALT_BYTE_SIZE % 3 > 0 ? 1 : 0)) * 4;
public const int HASH_BYTE_SIZE = 16;
public const int PBKDF2_ITERATIONS = 1000;
public const int ITERATION_INDEX = 0;
public const int SALT_INDEX = 1;
public const int PBKDF2_INDEX = 2;
private static SecureRandom CryptoRandom = new SecureRandom();
public static string CreateHash(string password)
byte[] salt = new byte[SALT_BYTE_SIZE];
CryptoRandom.NextBytes(salt);
byte[] hash = PBKDF2(password, salt, PBKDF2_ITERATIONS, HASH_BYTE_SIZE);
string saltString = Convert.ToBase64String(salt);
string hashString = Convert.ToBase64String(hash);
return saltString + hashString;
public static bool ValidatePassword(string password, string correctHash)
string saltString = correctHash.Substring(0, SALT_BASE64_LENGTH);
string hashString = correctHash.Substring(SALT_BASE64_LENGTH);
byte[] salt = Convert.FromBase64String(saltString);
byte[] hash = Convert.FromBase64String(hashString);
byte[] testHash = PBKDF2(password, salt, PBKDF2_ITERATIONS, hash.Length);
return SlowEquals(hash, testHash);
private static bool SlowEquals(byte[] a, byte[] b)
uint diff = (uint)a.Length ^ (uint)b.Length;
for (int i = 0; i < a.Length && i < b.Length; i++)
diff |= (uint)(a[i] ^ b[i]);
private static byte[] PBKDF2(string password, byte[] salt, int iterations, int outputBytes)
var pdb = new Pkcs5S2ParametersGenerator();
pdb.Init(PbeParametersGenerator.Pkcs5PasswordToBytes(password.ToCharArray()), salt,
var key = (KeyParameter)pdb.GenerateDerivedMacParameters(outputBytes * 8);