| CARVIEW |
Select Language
HTTP/2 301
date: Sat, 27 Dec 2025 00:59:01 GMT
content-type: text/html
location: https://www.password-hashing.net/
server: cloudflare
x-github-request-id: 8F9A:3946E9:5C94B0:678993:694F2F55
accept-ranges: bytes
age: 0
via: 1.1 varnish
x-served-by: cache-bom-vanm7210034-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1766797142.768505,VS0,VE194
vary: Accept-Encoding
x-fastly-request-id: 90ab21e4dc78cbcaaaf02d6ec796256ed613f52c
cf-cache-status: DYNAMIC
nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
strict-transport-security: max-age=15552000; includeSubDomains
x-content-type-options: nosniff
report-to: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=AjNKuv7czsG4ufzE9IFcKsfGcx2V469TyTcDCZyU9zujphHaj0vOAc4dCXXKqcNc1lscPGjon5USZwxRavkgs0GaWnuXY0BjR09R%2B5Pn2F%2F9kPf8"}]}
cf-ray: 9b44df778bdd46b3-BOM
alt-svc: h3=":443"; ma=86400
HTTP/2 200
date: Sat, 27 Dec 2025 00:59:02 GMT
content-type: text/html; charset=utf-8
server: cloudflare
last-modified: Thu, 11 Feb 2021 06:52:01 GMT
access-control-allow-origin: *
strict-transport-security: max-age=15552000; includeSubDomains
expires: Sat, 27 Dec 2025 01:09:02 GMT
cache-control: max-age=600
report-to: {"group":"cf-nel","max_age":604800,"endpoints":[{"url":"https://a.nel.cloudflare.com/report/v4?s=n1NHC7kIz1SltzgA4Tl0qp%2FiGw%2FrgkJecjUvENR%2Buixt48dnKjbzHlE2ELxecnVGfSPl9mzCTxzF4J5IJ%2BON0B7X%2FG8NOtXojoStAmjsA1gnoqGR6%2Bo%3D"}]}
x-proxy-cache: MISS
x-github-request-id: F8D8:3FD64F:5D0D1C:6804DD:694F2F55
x-content-type-options: nosniff
age: 0
via: 1.1 varnish
x-served-by: cache-bom-vanm7210083-BOM
x-cache: MISS
x-cache-hits: 0
x-timer: S1766797142.072050,VS0,VE199
vary: Accept-Encoding
x-fastly-request-id: cda19f900577e39b9764f26d7cbcf16435545596
cf-cache-status: DYNAMIC
nel: {"report_to":"cf-nel","success_fraction":0.0,"max_age":604800}
content-encoding: gzip
cf-ray: 9b44df79986c98ef-BOM
alt-svc: h3=":443"; ma=86400
Password Hashing Competition
Password hashing is everywhere, from web services' credentials storage
to mobile and desktop authentication or disk encryption systems.
Yet there wasn't an established standard to fulfill the needs of
modern applications and to best protect against attackers.
We started the Password Hashing Competition (PHC) to
solve this problem.
PHC ran from 2013 to 2015 as an open competition—the same kind of process as NIST's AES and SHA-3 competitions, and the most effective way to develop a crypto standard. We received 24 candidates, including many excellent designs, and selected one winner, Argon2, an algorithm designed by Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich from University of Luxembourg.
We recommend that you use Argon2 rather than legacy algorithms. You'll find the specifications and reference code just below.
There are two main versions of Argon2, Argon2i and Argon2d. Argon2i is the safest against side-channel attacks, while Argon2d provides the highest resistance against GPU cracking attacks.
Argon2i and Argon2d are parametrized by
Bindings are available for most languages.
In Q1 2013 we published the call for submissions, and by the deadline on March 31, 2014 we had received 24 submissions. In December 2014 we shortlisted 9 finalists and published a short report. In July 2015 we announced Argon2 as a winner and gave special recognition to four of the finalists:
Issues with the Argon2 code should preferably be reported in the GitHub issues space. For private contact related to Argon2, please email [email protected]. For any other issue, please email [email protected].
Password Hashing Competition
and our recommendation for hashing passwords: Argon2
PHC ran from 2013 to 2015 as an open competition—the same kind of process as NIST's AES and SHA-3 competitions, and the most effective way to develop a crypto standard. We received 24 candidates, including many excellent designs, and selected one winner, Argon2, an algorithm designed by Alex Biryukov, Daniel Dinu, and Dmitry Khovratovich from University of Luxembourg.
We recommend that you use Argon2 rather than legacy algorithms. You'll find the specifications and reference code just below.
Argon2
- GitHub repo containing the specs and code (latest release)
- Specifications PDF, including rationale and analysis
There are two main versions of Argon2, Argon2i and Argon2d. Argon2i is the safest against side-channel attacks, while Argon2d provides the highest resistance against GPU cracking attacks.
Argon2i and Argon2d are parametrized by
- A time cost, which defines the execution time
- A memory cost, which defines the memory usage
- A parallelism degree, which defines the number of threads
Bindings are available for most languages.
PHC
The Password Hashing Competition (PHC) was initiated by Jean-Philippe Aumasson in fall 2012, and organized thanks to a panel joined by Tony Arcieri (@bascule, Square) Dmitry Chestnykh (@dchest, Coding Robots), Jeremi Gosney (@jmgosney, Stricture Consulting Group), Russell Graves (@bitweasil, Cryptohaze), Matthew Green (@matthew_d_green, Johns Hopkins University), Peter Gutmann (University of Auckland), Pascal Junod (@cryptopathe, HEIG-VD), Poul-Henning Kamp (FreeBSD), Stefan Lucks (Bauhaus-Universität Weimar), Samuel Neves (@sevenps, University of Coimbra), Colin Percival (@cperciva, Tarsnap), Alexander Peslyak (@solardiz, Openwall), Marsh Ray (@marshray, Microsoft), Jens Steube (@hashcat, Hashcat project), Steve Thomas (@Sc00bzT, TobTu), Meltem Sonmez Turan (NIST), Zooko Wilcox-O'Hearn (@zooko, Least Authority Enterprises), Christian Winnerlein (@codesinchaos, Pactas), Elias Yarrkov (@yarrkov).In Q1 2013 we published the call for submissions, and by the deadline on March 31, 2014 we had received 24 submissions. In December 2014 we shortlisted 9 finalists and published a short report. In July 2015 we announced Argon2 as a winner and gave special recognition to four of the finalists:
- Catena, for its agile framework approach and side-channel resistance (Catena-v5.tar.gz)
- Lyra2, for its elegant sponge-based design, and alternative approach to side-channel resistance (Lyra2-v3.tar.gz)
- Makwa, for its unique delegation feature and its factoring-based security (Makwa-v1.tar.gz)
- yescrypt, for its rich feature set and easy upgrade path from scrypt (yescrypt-v2.tar.gz)
Contact
Questions about Argon2 or PHC can be addressed to the public mailing list [email protected] (you need to register first by sending an empty message to [email protected]). Public archives of this mailing list are available thanks to Gmane.Issues with the Argon2 code should preferably be reported in the GitHub issues space. For private contact related to Argon2, please email [email protected]. For any other issue, please email [email protected].