Generate and verify Argon2id, Argon2i, and Argon2d password hashes with configurable memory, iterations, and parallelism. OWASP's recommended password hashing algorithm β your password never leaves the browser.
| Variant | Memory | Iterations | Notes |
|---|---|---|---|
| Argon2id | 19 MiB | 2 | OWASP minimum acceptable |
| Argon2id | 64 MiB | 2 | Recommended REC |
| Argon2id | 128 MiB | 3 | High-value accounts |
| Argon2i | 19 MiB | 2 | Side-channel resistant contexts |
| Argon2d | 64 MiB | 3 | GPU attack resistance priority |
OWASP recommends Argon2id as the primary choice. It combines protection against side-channel attacks (Argon2i) and GPU attacks (Argon2d). Always use a unique random salt per password. Never use MD5, SHA-1, or unsalted SHA-256 for passwords.
AquilaX detects MD5/SHA1 password hashing, missing salts, hardcoded credentials, and insecure password storage patterns across your entire codebase.