I have made a custom hashing method to help make my users' passwords more secure if the database will be leaked.
The encryption method is like this:
A method takes an input of 1 character, gets the ASCII value of the character, shifts it a number of bytes one way and a number of bytes the other way, and then returns like
$shift_left.$original_char.$shift_right
. After this, the entire jumbled string is hashed using BCrypt with a 22 character salt using 16 rounds.
Does this actually make the passwords more difficult to crack? Since a dictionary attack wouldn't work without my hashing method that has led