Argon2 Hash Calculator

hash

All hashing runs in your browser. Data is never sent to any server.

Password Input

Verify Password

1. How to Use

  1. Enter your password in the input box.
  2. Configure type (Argon2id recommended), memory, time, parallelism.
  3. Optionally set a salt or use Random for a new salt.
  4. Click 'Generate Argon2 Hash' and use Verify to test passwords.
  5. Copy the encoded hash (includes all parameters and salt).

2. How It Works

Argon2 fills memory with a pseudo-random data structure, then makes many passes that depend on both the password and the memory. Argon2id mixes Argon2i (side-channel resistant) and Argon2d (GPU resistant).

Memory matrix: 2^mem bytes organized in lanes and segments. Fill phase: each lane initialized with H(password,salt,lane,segment). Each block B[i][j] = G(B[i][j-1], B[i'][j']) with dependencies on previous blocks.

Compression function G: P = H(B₁,B₂), Q = P⊕(P>>>32), then 16-block permutation. Final hash: XOR of last blocks of each lane, then more passes.

Parameters: time (iterations), mem (KB), parallelism, hashLen. More memory and time → slower attacks.

3. About Argon2

Argon2 won the Password Hashing Competition (2015). Argon2id is recommended for most applications, balancing side-channel and GPU resistance.

This Argon2 hash calculator generates Argon2id, Argon2i, or Argon2d hashes. Configure memory, time, parallelism, and optionally salt.

All hashing runs in your browser.

4. Advantages

  • Memory-hard: Requires large RAM; limits parallel attacks.
  • Configurable: Tune security vs. performance.
  • Modern standard: Recommended by OWASP and NIST.
  • Encoded output: Hash includes parameters for verification.

5. Real-World Use Cases

  • Password storage: Preferred for new applications.
  • Key derivation: Derive encryption keys from passwords.
  • Security-critical systems: When best-in-class hashing is required.
  • Compliance: Meet password hashing requirements.