yigityalim
projectshandbookslabshireshare
xgithub
Back to Labs
May 11, 2026·crypto

Argon2id Parameter Configurer

Tune Argon2id parameters (m, t, p) interactively, measure hash latency in your browser, see how many years it survives an RTX 4090 attack. Pick production KDF settings with numbers, not vibes.

argon2 · kdf · password-hashing · owasp

NextCron Builder
siteprojectshandbookslabschangelog
aboutusesnowhireshare
elsewherexgithublinkedinemail
metarssllms.txtsitemap
© 2026 Yiğit Yalım. All rights reserved.
/

"Argon2id is memory-hard and GPU-resistant" — fine, but how much memory, how many iterations, how much parallelism? What's behind OWASP's m=65536, t=3, p=4 recommendation? This lab lets you drag parameters, measure latency, and project survival time against real RTX 4090 attacker throughput.

ArgonConfigurer — Argon2id parameter explorerArgonConfigurer

Tarayıcı notu: SubtleCrypto'da Argon2 yoktur. Gecikme ölçümü için PBKDF2-SHA-512 kullanılır. Crack-time projeksiyonları gerçek Argon2id benchmark'larına dayanır.

m — memory (KiB)64 MiB
t — iterations3
p — parallelism4
Argon2id(m=65536, t=3, p=4, hash=32)
crack time · password entropy ~165 bit
RTX 4090 (single)800 H/s7.6e38 yr
8× RTX 4090 rig6400 H/s9.5e37 yr
cloud cluster (est)100000 H/s6.1e36 yr

m artışı GPU bellek sınırını aşar → paralel saldırı sayısı düşer. t artışı doğrusal yavaşlatır. p CPU thread'lerini etkiler, GPU saldırısını azaltmaz.

Parameters

ParamEffectOWASP minOWASP rec
m (memory, KiB)GPU memory ceiling → parallel attacks shrink19456 (19 MiB)65536 (64 MiB)
t (iterations)Linear slowdown23
p (parallelism)Server thread count14

Practical tip

Aim for 500ms target latency server-side. Login is a single password hash; 500ms doesn't annoy users but ruins attackers:

  • 500ms × 1000 ≈ 500s = ~2 attempts/sec
  • 800 H/s per GPU at m=65536 → millions of years to brute-force

CPU-bound: run inside a Node.js worker thread to avoid blocking the event loop. @node-rs/argon2 or the native argon2 package is recommended.

Browser caveat

This lab doesn't run real Argon2id — SubtleCrypto has no Argon2 implementation. Latency uses PBKDF2-SHA-512 as a stand-in. Crack-time projections come from real Argon2id benchmarks (academic papers + community 2024).