Group :: System/Base
RPM: argon2
Main Changelog Spec Patches Sources Download Gear Bugs and FR Repocop
Current version: 20190702-alt1
Build date: 31 july 2019, 20:55 ( 243.1 weeks ago )
Size: 1146.63 Kb
Home page: https://github.com/P-H-C/phc-winner-argon2
License: Public Domain or ASL 2.0
Summary: The password-hashing tools
Description:
List of contributors List of rpms provided by this srpm:
ACL:
Build date: 31 july 2019, 20:55 ( 243.1 weeks ago )
Size: 1146.63 Kb
Home page: https://github.com/P-H-C/phc-winner-argon2
License: Public Domain or ASL 2.0
Summary: The password-hashing tools
Description:
Argon2 is a password-hashing function that summarizes the state of the art
in the design of memory-hard functions and can be used to hash passwords
for credential storage, key derivation, or other applications.
It has a simple design aimed at the highest memory filling rate and
effective use of multiple computing units, while still providing defense
against tradeoff attacks (by exploiting the cache and memory organization
of the recent processors).
Argon2 has three variants: Argon2i, Argon2d, and Argon2id.
* Argon2d is faster and uses data-depending memory access, which makes it
highly resistant against GPU cracking attacks and suitable for applications
with no threats from side-channel timing attacks (eg. cryptocurrencies).
* Argon2i instead uses data-independent memory access, which is preferred for
password hashing and password-based key derivation, but it is slower as it
makes more passes over the memory to protect from tradeoff attacks.
* Argon2id is a hybrid of Argon2i and Argon2d, using a combination of
data-depending and data-independent memory accesses, which gives some of
Argon2i's resistance to side-channel cache timing attacks and much of
Argon2d's resistance to GPU cracking attacks.
Current maintainer: Alexey Shabalin in the design of memory-hard functions and can be used to hash passwords
for credential storage, key derivation, or other applications.
It has a simple design aimed at the highest memory filling rate and
effective use of multiple computing units, while still providing defense
against tradeoff attacks (by exploiting the cache and memory organization
of the recent processors).
Argon2 has three variants: Argon2i, Argon2d, and Argon2id.
* Argon2d is faster and uses data-depending memory access, which makes it
highly resistant against GPU cracking attacks and suitable for applications
with no threats from side-channel timing attacks (eg. cryptocurrencies).
* Argon2i instead uses data-independent memory access, which is preferred for
password hashing and password-based key derivation, but it is slower as it
makes more passes over the memory to protect from tradeoff attacks.
* Argon2id is a hybrid of Argon2i and Argon2d, using a combination of
data-depending and data-independent memory accesses, which gives some of
Argon2i's resistance to side-channel cache timing attacks and much of
Argon2d's resistance to GPU cracking attacks.
List of contributors List of rpms provided by this srpm:
- argon2
- argon2-debuginfo
- libargon2
- libargon2-debuginfo
- libargon2-devel