Password-based key derivation function created in 2015
This article relies excessively on references to primary sources. Please improve this article by adding secondary or tertiary sources. Find sources: "Argon2" – news · newspapers · books · scholar · JSTOR(January 2016) (Learn how and when to remove this message)
Argon2 is a key derivation function that was selected as the winner of the 2015 Password Hashing Competition.[1][2] It was designed by Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich from the University of Luxembourg.[3] The reference implementation of Argon2 is released under a Creative Commons CC0 license (i.e. public domain) or the Apache License 2.0, and provides three related versions:
Argon2d maximizes resistance to GPU cracking attacks. It accesses the memory array in a password dependent order, which reduces the possibility of time–memory trade-off (TMTO) attacks, but introduces possible side-channel attacks.
Argon2i is optimized to resist side-channel attacks. It accesses the memory array in a password independent order.
Argon2id is a hybrid version. It follows the Argon2i approach for the first half pass over memory and the Argon2d approach for subsequent passes. RFC 9106 recommends using Argon2id if you do not know the difference between the types or you consider side-channel attacks to be a viable threat.[4]
All three modes allow specification by three parameters that control:
execution time
memory required
degree of parallelism
^"Password Hashing Competition"
^Jos Wetzels (2016-02-08). "Open Sesame: The Password Hashing Competition and Argon2". arXiv:1602.03097 [cs.CR].
^Argon2: the memory-hard function for password hashing and other applications, Alex Biryukov, et al, October 1, 2015
^Biryukov, Alex; Dinu, Daniel; Khovratovich, Dmitry; Josefsson, Simon (September 2021). "Argon2 Memory-Hard Function for Password Hashing and Proof-of-Work Applications". Retrieved September 9, 2021.
Argon2 is a key derivation function that was selected as the winner of the 2015 Password Hashing Competition. It was designed by Alex Biryukov, Daniel...
password storage). argon2: bcrypt is more lightweight than Argon2. This may pose a problem for some web applications where usage of Argon2 would require lowering...
LUKS, with LUKS2 featuring resilience to header corruption, and using the Argon2 key derivation function by default, whereas LUKS1 uses PBKDF2. Conversion...
organized by cryptographers and security practitioners. On 20 July 2015, Argon2 was selected as the final PHC winner, with special recognition given to...
for this purpose, including bcrypt, scrypt and, more recently, Lyra2 and Argon2 (the latter being the winner of the Password Hashing Competition). The large-scale...
hash functions that perform key stretching – such as PBKDF2, scrypt or Argon2 – commonly use repeated invocations of a cryptographic hash to increase...
performance of similar algorithms. Balloon is compared by its authors with Argon2, a similarly performing algorithm. There are three steps in the algorithm:...
most Linux and BSD distributions. Free and open-source software portal Argon2 – winner of the Password Hashing Competition in 2015 bcrypt – blowfish-based...
Competition (PHC) was held to develop a more resistant approach. On 20 July 2015 Argon2 was selected as the final PHC winner, with special recognition given to...
attacks from graphics processors and special purpose hardware. The winner, Argon2, was selected on July 1, 2015. Some but not all disk encryption software...
run slowly, on GPUs. Examples are DES, Triple DES, bcrypt, scrypt, and Argon2. The emergence over the past decade[when?] of hardware acceleration in a...
AES-256 that is faster than a brute-force attack. In 2015 he developed the Argon2 key derivation function with Daniel Dinu and Dmitry Khovratovich. Since...
for BLAKE2b, Salsa20, ChaCha20, and AVX2 and AVX-512 in implementation of Argon2 algorithm. Multimedia Blender uses AVX, AVX2 and AVX-512 in the Cycles render...
during the Password Hashing Competition in July 2015, which was won by Argon2. It is also used in proof-of-work algorithms such as Lyra2REv2, adopted...
text passwords to frustrate dictionary attacks, usually using PBKDF2 or Argon2. Hardware acceleration: Whether dedicated cryptographic accelerator expansion...