-
A nice DX improvement would be to provide `verify` and `hash` functions that handles [PHC strings](https://github.com/P-H-C/phc-string-format/blob/master/phc-sf-spec.md).
Here's a wrapper I current…
-
For some reason, UPB runs Argon2i on the password and salt, and then Argon2d on the hex-encoded result. This isn't the same as the usually recommended Argon2id.
This is only a minor flaw, as n-roun…
-
### The problem you're addressing (if any)
LUKS has default KDF parameters which allow it to be used on a wide spectrum of hardware. Qubes OS has very significant base system requirements, and Qube…
-
### The problem you're addressing (if any)
QubesOS 4.1 seems to use argon2i (**not** argon2id) by default for the LUKS KDF.
It would appear as though argon2i is less resistant to attack by sophi…
-
I tested using this code and I always get the same digest in the hash string.
```
Hash := TArgon2.HashPassword(Pwd);
Matched := TArgon2.CheckPassword(Pwd, Hash, Rehash);
```
the check passw…
-
Hello @idrassi
Would it be possible to replace PBKDF2 with the more secure argon2 (I suppose Argon2id would be the best in this case)
I know you've answered this question a few years ago howeve…
-
According to https://mjg59.dreamwidth.org/66429.html one should use argon2id as PBKDF rather than pbkdf2.
As I read:
https://github.com/latchset/clevis/blob/master/src/luks/clevis-luks-common-func…
-
Hello everybody 👋 thank you for your amazing work !
I was wondering now that the hashing function Argon2id is available in the official [crypto module](https://pkg.go.dev/golang.org/x/crypto/argon2…
-
[The latest "Cuda 8.0"-plugin](https://github.com/xmrig/xmrig-cuda/releases/tag/v3.0.0) not working with "argon2id/chukwa"-algo.
> `nv` disabled (no suitable configuration found)
Tested with all…
-
![Screenshot 2023-02-16 224117](https://user-images.githubusercontent.com/13182387/219367705-e9273048-b308-4390-aaa6-6e22d1fd0666.png)
### Steps To Reproduce
Login via desktop app or web vault
…