Hacker News new | past | comments | ask | show | jobs | submit login

Quick answer: use Argon2i, unless you have very special needs.

"Argon2i uses data-independent memory access, which is preferred for password hashing and password-based key derivation. Argon2i is slower as it makes more passes over the memory to protect from tradeoff attacks."

"Argon2d is faster and uses data-depending memory access, which makes it suitable for cryptocurrencies and applications with no threats from side-channel timing attacks."

The IETF draft is here: https://tools.ietf.org/html/draft-josefsson-argon2-00




Guidelines | FAQ | Lists | API | Security | Legal | Apply to YC | Contact

Search: