Toy VS phc-winner-argon2

Compare Toy vs phc-winner-argon2 and see what are their differences.

Our great sponsors
  • InfluxDB - Power Real-Time Data Analytics at Scale
  • WorkOS - The modern identity platform for B2B SaaS
  • SaaSHub - Software Alternatives and Reviews
Toy phc-winner-argon2
38 14
215 4,641
- 0.9%
8.4 0.0
2 months ago about 1 month ago
C C
GNU General Public License v3.0 or later GNU General Public License v3.0 or later
The number of mentions indicates the total number of mentions that we've tracked plus the number of user suggested alternatives.
Stars - the number of stars that a project has on GitHub. Growth - month over month growth in stars.
Activity is a relative number indicating how actively a project is being developed. Recent commits have higher weight than older ones.
For example, an activity of 9.0 indicates that a project is amongst the top 10% of the most actively developed projects that we are tracking.

Toy

Posts with mentions or reviews of Toy. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2022-09-14.

phc-winner-argon2

Posts with mentions or reviews of phc-winner-argon2. We have used some of these posts to build our list of alternatives and similar projects. The last one was on 2023-01-10.
  • Argon2 Password Hashing Utility
    1 project | news.ycombinator.com | 11 Apr 2024
  • User tool to use Argon2 ideally Argon2id
    1 project | /r/privacy | 13 May 2023
  • PSA: upgrade your LUKS key derivation function
    1 project | /r/linux_programming | 18 Apr 2023
    Argon2, and it's derivations, are all memory hard. Beyond that, why change from 2i to 2id?
  • Why Argon2d and not Argon2id?
    1 project | /r/Dashlane | 3 Feb 2023
    ''Even though https://github.com/p-h-c/phc-winner-argon2 was standardized only somewhat recently, it is the result of the https://password-hashing.net/ and was a late re-design of Argon which also picked up ideas from a few other finalists. Since then there have been attacks on it, which caused the scheme to be tweaked to counter them better, this is why we have Argon2 v1.3 as the most current version, you may want to note that most of these attacks mostly weakened Argon2i and not Argon2d. Now during the competition results came up that your defense against time-memory trade-off attacks will suffer if you make sure that your scheme is immune to the various kinds of side-channel attacks that people have come up with (which also includes more "crazy" stuff like leaked intermediate state). Because of this, it was decided that there should be two versions: Argon2i and Argon2d. One offering the best possible protection while trying its best to be immune against side-channel attacks (by using data- and password-independent memory access patterns) and the other dropping these requirements and all-out optimizing against such attacks (by using data- and possibly password-dependent memory access patterns). Argon2d offers better protection than Argon2i at the expense of being more vulnerable to side-channel attacks. Now you have to ask yourself: Do these apply? No, not really. You said that you are on Android, which is not exactly known for high platform security, so if you have an attacker in such a privileged position to execute something like cache-timing attacks or similar attacks that try to exploit memory access patterns, your user has already much bigger problems anyways. It's a similar logic as with AES: https://en.wikipedia.org/wiki/Advanced\_Encryption\_Standard#Side-channel\_attacks, but these have never been observed in the wild, probably because other options are much easier, more reliable and equally as effective. So the conclusion is: You want to use Argon2d. So for whom is Argon2i? People who need to run applications on shared hardware or where timing attacks are a real thread. For example if you run a webserver in a public cloud on shared hardware. Then you have to be worried about who else is on the same CPU. And with webservers it's also easier to measure the timing of reactions and trying to deduce information from that."
  • The forgotten mistake that killed Japan’s software industry
    2 projects | /r/programming | 10 Jan 2023
    And if you don't like my code you should take a look at the reference implementation.
  • Can't find documentation for C library, openssl for hashing.
    1 project | /r/programminghelp | 26 Oct 2022
    AFAIK, Argon2 is the algorithm that's currently recommended for this. OpenSSL doesn't have support for it, so I'd recommend using the Argon2 reference implementation instead.
  • Which argon2 crate to use?
    2 projects | /r/rust | 20 Sep 2022
    Which one should I use in terms of performance/standards? How about their performances comparing to the c implementation, https://github.com/P-H-C/phc-winner-argon2?
  • Is anyone aware of an argon2/argon2id javascript implementation that will work in both NodeJS and the beowser and produce the same hashes?
    1 project | /r/cryptography | 25 Aug 2022
    Did you try the Argon2 test vectors on each? They should all come out the same for both implementations, any implementation that doesn't match the test vectors is buggy.
  • Intel and AMD CPUs vulnerable to a new speculative execution attack (RETBLEED)
    5 projects | news.ycombinator.com | 12 Jul 2022
    > Is there anything stronger than blowfish?

    I think you mean bcrypt..

    Both Argon2 and scrypt win over that:

    https://github.com/P-H-C/phc-winner-argon2

  • The entirety of Twitch has reportedly been leaked (Source codes and user payouts among the data) | VGC
    1 project | /r/Games | 6 Oct 2021
    Here is the documentation for Argon2 to see why and how it's different, also why it won an award: https://github.com/P-H-C/phc-winner-argon2/blob/master/argon2-specs.pdf

What are some alternatives?

When comparing Toy and phc-winner-argon2 you can also consider the following projects:

nature - 🍀 The Nature Programming Language, may you be able to experience the joy of programming.

orion - Usable, easy and safe pure-Rust crypto

ghc-proposals - Proposed compiler and language changes for GHC and GHC/Haskell

orion - Usable, easy and safe pure-Rust crypto [Moved to: https://github.com/orion-rs/orion]

parsec - A monadic parser combinator library

scrypt - The scrypt key derivation function was originally developed for use in the Tarsnap online backup system and is designed to be far more secure against hardware brute-force attacks than alternative functions such as PBKDF2 or bcrypt.

fio - Flexible I/O Tester

PyNacl - Python binding to the Networking and Cryptography (NaCl) library

std_bot_cpp

OnAllFronts-Public - UE5 MilSim FPS / RTS Game (formerly ProjectM)

refstring - A c-string wrapper library designed for efficient memory management

AECforWebAssembly - A port of ArithmeticExpressionCompiler from x86 to WebAssembly, so that the programs written in the language can run in a browser. The compiler has been rewritten from JavaScript into C++.