Replies: 1 comment 3 replies
-
This is the Argon2id hash format that follows the Argon2 specification, it shouldn't be changed. bcrypt also does something similar by including the cost inside the hash. This allows you to change the default parameters later on, in case of Argon2 that would be parallelism/iterations/memory. If these parameters weren't part of the hash, you wouldn't be able to change them for new passwords without breaking old passwords. That would mean accounts would become more vulnerable over time as computers get stronger. |
Beta Was this translation helpful? Give feedback.
3 replies
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
-
Hello, Janko!
I've a question: are there any reasons why hashed passwords stored in DB along with hashing params?
Example:
I mean, if hashing params are consistent through the app, why do we need to store it in DB, helping a potential attacker to understand what algorithm and params were used?
Isn't it better to strip
$argon2id$v=19$m=65536,t=2,p=1
part from password hash before store it?Thank you!
Beta Was this translation helpful? Give feedback.
All reactions