Argon2 Hash Calculator
hash
All hashing runs in your browser. Data is never sent to any server.
Password Input
Verify Password
1. How to Use
- Enter your password in the input box.
- Configure type (Argon2id recommended), memory, time, parallelism.
- Optionally set a salt or use Random for a new salt.
- Click 'Generate Argon2 Hash' and use Verify to test passwords.
- Copy the encoded hash (includes all parameters and salt).
2. How It Works
Argon2 fills memory with a pseudo-random data structure, then makes many passes that depend on both the password and the memory. Argon2id mixes Argon2i (side-channel resistant) and Argon2d (GPU resistant).
Memory matrix: 2^mem bytes organized in lanes and segments. Fill phase: each lane initialized with H(password,salt,lane,segment). Each block B[i][j] = G(B[i][j-1], B[i'][j']) with dependencies on previous blocks.
Compression function G: P = H(B₁,B₂), Q = P⊕(P>>>32), then 16-block permutation. Final hash: XOR of last blocks of each lane, then more passes.
Parameters: time (iterations), mem (KB), parallelism, hashLen. More memory and time → slower attacks.
3. About Argon2
Argon2 won the Password Hashing Competition (2015). Argon2id is recommended for most applications, balancing side-channel and GPU resistance.
This Argon2 hash calculator generates Argon2id, Argon2i, or Argon2d hashes. Configure memory, time, parallelism, and optionally salt.
All hashing runs in your browser.
4. Advantages
- Memory-hard: Requires large RAM; limits parallel attacks.
- Configurable: Tune security vs. performance.
- Modern standard: Recommended by OWASP and NIST.
- Encoded output: Hash includes parameters for verification.
5. Real-World Use Cases
- Password storage: Preferred for new applications.
- Key derivation: Derive encryption keys from passwords.
- Security-critical systems: When best-in-class hashing is required.
- Compliance: Meet password hashing requirements.