Updated as of July 2023
Author: Allister D.
In today's digital age, the average internet user manages a slew of online accounts, each demanding its unique set of login credentials. As the need for more complex and diverse passwords increases, so does the difficulty in remembering all of them. A password manager is a valuable tool that addresses this challenge. It ensures not only the convenience of remembering all your credentials but also the security of your digital identity.
However, all these benefits hinge on the strength of the encryption algorithm the password manager uses. Encryption protects your sensitive information from being accessed even if someone were to gain physical access to your device or storage.
PBKDF2 (Password-Based Key Derivation Function 2) and Argon2 are two common encryption methods utilized by password managers.
PBKDF2, a key derivation function, has been widely adopted due to its inclusion in cryptographic standards. It works by applying a pseudorandom function, like a hash function, to the input password, along with a salt, for many iterations. This approach makes brute-force and rainbow table attacks considerably more difficult, but it's not immune to all types of attacks. The major limitation of PBKDF2 is that it doesn't utilize memory hardness, making it more vulnerable to GPU, FPGA, and ASIC-based attacks.
On the other hand, Argon2, the winner of the Password Hashing Competition in 2015, is built to resist various types of attacks, including those that were effective against PBKDF2. Argon2 addresses PBKDF2's weaknesses in the following ways: