Skip to content

Is Argon2 actually the best algorithm for password hashing? #1329

Discussion options

You must be logged in to vote

On slide 21 of this presentation Frank mentions that Argon2 is worse than bcrypt for some parameters, demonstrating he's well aware of this. In fact, if you look at the roadmap, you'll see that bscrypt has been listed as a consideration, which is meant to be an improvement on bcrypt and is also by someone on the PHC panel.

bcrypt has numerous implementation issues and is also not a KDF, so then you need separate algorithms for password hashing and password-based key derivation. Furthermore, Argon2 is far from bad, has received academic attention, is widely supported/recommended, and is more flexible than bcrypt.

Most importantly, by using any password hashing algorithm you'll already be d…

Replies: 1 comment

Comment options

You must be logged in to vote
0 replies
Answer selected by CViniciusSDias
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Category
Q&A
Labels
None yet
2 participants