Blog | G5 Cyber Security

Argon2 vs bcrypt: Speed & Security

TL;DR

If your password hashing takes less than 1000 milliseconds (1 second) on your server, Argon2 is likely slower and potentially less secure than bcrypt. Stick with bcrypt in this case. For longer runtimes, Argon2 offers better security.

Understanding the Problem

Argon2 is a modern password hashing algorithm designed to be more resistant to attacks like GPU cracking than older algorithms like bcrypt. However, it’s more complex and requires careful configuration. A key factor in its security is runtime – how long it takes to hash a password. If Argon2 doesn’t run for a sufficient amount of time (generally considered at least 1000ms), it doesn’t get the chance to fully utilise its memory-hard properties, reducing its effectiveness.

Solution: Check & Adjust Your Password Hashing

  1. Test Your Current Implementation’s Runtime
  • If Runtime is < 1000ms (1 Second)
  • If Runtime is > 1000ms
  • Regularly Re-evaluate
  • Important Considerations

    Exit mobile version