refactor(security): upgrade password hashing algorithm #69

Open
opened 2025-08-19 06:54:30 +00:00 by chartgerink · 0 comments
Owner

We currently use a bcrypt has implementation for hashing passwords and the like. bcrypt is efficient, yet security could be improved if the argon2 hashing would be used. Downside is that argon2 burns more CPU on the server, which could affect performance.

This issue is to track and discuss considerations in upgrading the hashing approach.

We currently use a `bcrypt` has implementation for hashing passwords and the like. `bcrypt` is efficient, yet security *could* be improved if the `argon2` hashing would be used. Downside is that `argon2` burns more CPU on the server, which could affect performance. This issue is to track and discuss considerations in upgrading the hashing approach.
Sign in to join this conversation.
No milestone
No project
No assignees
1 participant
Notifications
Due date
The due date is invalid or out of range. Please use the format "yyyy-mm-dd".

No due date set.

Dependencies

No dependencies set.

Reference: libscie/researchequals-api#69
No description provided.