Argon2 Hash Calculator

Online Argon2 hash tool in browser

All hashing runs in your browser. Data is never sent to any server.

Password Input

Verify Password

Argon2 Guide

Use Argon2 when you need password-oriented hashing with verification support.

1. How can I use this Argon2 hash calculator on this page?

  1. Enter your password in the input box.
  2. Configure type (Argon2id recommended), memory, time, parallelism.
  3. Optionally set a salt or use Random for a new salt.
  4. Click 'Generate Argon2 Hash' and use Verify to test passwords.
  5. Copy the encoded hash (includes all parameters and salt).

2. How does this calculator compute Argon2 locally in my browser?

Argon2 fills memory with a pseudo-random data structure, then makes many passes that depend on both the password and the memory. Argon2id mixes Argon2i (side-channel resistant) and Argon2d (GPU resistant).

Memory matrix: 2^mem bytes organized in lanes and segments. Fill phase: each lane initialized with H(password,salt,lane,segment). Each block B[i][j] = G(B[i][j-1], B[i'][j']) with dependencies on previous blocks.

Compression function G: P = H(B₁,B₂), Q = P⊕(P>>>32), then 16-block permutation. Final hash: XOR of last blocks of each lane, then more passes.

Parameters: time (iterations), mem (KB), parallelism, hashLen. More memory and time → slower attacks.

3. What is Argon2, and when should I use it?

Argon2 won the Password Hashing Competition (2015). Argon2id is recommended for most applications, balancing side-channel and GPU resistance.

This Argon2 hash calculator generates Argon2id, Argon2i, or Argon2d hashes. Configure memory, time, parallelism, and optionally salt.

All hashing runs in your browser.

4. Why choose Argon2 over other hash or checksum algorithms?

  • Memory-hard: Requires large RAM; limits parallel attacks.
  • Configurable: Tune security vs. performance.
  • Modern standard: Recommended by OWASP and NIST.
  • Encoded output: Hash includes parameters for verification.

5. Where is Argon2 commonly used in apps and infrastructure?

  • Password storage: Preferred for new applications.
  • Key derivation: Derive encryption keys from passwords.
  • Security-critical systems: When best-in-class hashing is required.
  • Compliance: Meet password hashing requirements.