GPU-bursting Password and Key Derivation: Argon2

--

The Ringo data breaches remind me that companies still struggle to protect their systems properly. But, there are no excuses any more, as passwords and customer details should be stored in a secure form. In this article, we will look at the Argon2 key derivation method, which can be used to create encryption keys from a secret value and a salt and also as a way to store passwords. This method is robust…

--

--

Prof Bill Buchanan OBE FRSE
ASecuritySite: When Bob Met Alice

Professor of Cryptography. Serial innovator. Believer in fairness, justice & freedom. Based in Edinburgh. Old World Breaker. New World Creator. Building trust.