Brute-Force vs. Argon2: How Secure Are Your Passwords?

The 2025 password table from Hive Systems shows: Weak passwords are cracked faster than ever – thanks to the GPU and AI boom. We explain how Argon2 can offer real protection and what users and service providers should keep in mind.

Reading time:
4 min
Brute-Force vs. Argon2: How Secure Are Your Passwords? Image by storyset/Freepik

Brute-Force vs. Argon2: How Secure Are Your Passwords?

At first glance, the figures from cybersecurity firm Hive Systems look alarming. As Heise reports, passwords with just eight lowercase letters, hashed with bcrypt, can be cracked in a matter of weeks – if powerful GPUs like the Nvidia RTX 5090 or even A100 are used. But these figures require context.

Why are passwords hashed?

Passwords should never be stored in plaintext. Instead, password hashing algorithms like bcrypt or Argon2 are used. These generate a hash value from the password that cannot be reversed. But if a password has low entropy – for example, because it’s short or easy to guess – attackers can try all possible combinations. This process is known as a brute-force attack. In practice, these attacks often use so-called wordlists, containing real passwords from past data breaches.

To even attempt such an attack, an attacker must first gain access to the hashed passwords – for example, via a successful cyberattack, data leak, or misconfigured database. Unfortunately, such incidents are common: In recent years, even major platforms like LinkedIn, Dropbox, and Adobe have been compromised. As a result, millions or even billions of password hashes have circulated.

Attackers often end up with actual login data: an email address, the cracked password, and at least one service where this combination worked. When such a breach becomes public, many services prompt users to change their passwords – which is necessary and right. But one thing often goes unnoticed: many users reuse the same email-password combination across multiple platforms. This reuse presents a real risk: it enables attackers to launch automated attacks on additional user accounts – so-called credential stuffing attacks.

Why are GPUs so effective at cracking passwords?

GPUs are optimized for parallel computations. While CPUs have 8 or 16 cores, modern GPUs have thousands of computing units. This means billions of password candidates can be processed simultaneously. With traditional, memory-light hash functions like bcrypt, this leads to a massive performance gain for attackers.

Memory as a weapon against brute-force: Enter Argon2

This is where Argon2 comes in. This modern standard is designed to be both computationally and memory intensive. A typical configuration uses several hundred megabytes to multiple gigabytes of RAM per hash. This severely limits parallelism.

Example: How memory slows attackers down

If a password hash with Argon2id requires 2 GiB of RAM, a GPU with 32 GiB VRAM can compute a maximum of 16 hashes simultaneously. With bcrypt, that number would be in the thousands. This severely slows down hardware – and nearly neutralizes the GPU’s speed advantage.

Argon2 comes in three variants: Argon2d, Argon2i, and Argon2id. The recommended variant is Argon2id as it resists side-channel attacks and is well-suited to defending against GPU-based brute-force attempts. Even the German BSI recommends memory-intensive hash functions like Argon2id.

Argon2 Parameters (example values):

What can users do?

Users often can’t control how their passwords are stored server-side. But they can check that tools like KeePassXC or Bitwarden use Argon2id with high memory requirements for internal encryption.

How does Argon2 differ from bcrypt?

FeaturebcryptArgon2id
Memory usagevery lowhigh (hundreds of MB to GB)
GPU protectionweakvery strong
Side-channel protectionmoderatehigh
BSI recommendationoutdatedrecommended

Why strong passwords still matter

Even the best hash function won’t help if the password itself is weak. Four-digit PINs (10,000 combinations) or passwords from wordlists can be cracked quickly even with Argon2. Therefore:

Check your password security

With services like the Identeco Leak Inspector, you can check if your email has appeared in known data breaches. This helps detect compromised credentials early.


Frequently Asked Questions (FAQ)

What is the difference between bcrypt and Argon2?

Argon2 is more modern, memory-intensive, and far harder for GPUs to crack than bcrypt.

Which Argon2 variant is the most secure?

Argon2id, as it combines the strengths of Argon2d and Argon2i.

How can I check if my password has been leaked?

Use tools like Identeco Leak Inspector or Leakchecker Uni Bonn.

What are good parameters for Argon2?

At least 512 MiB of RAM, 3 iterations, and 1–4 threads. Adjust depending on your system.

Contact an Expert

Do you have any further questions or need specific help? Write us a message or arrange a meeting directly.

Read more

Get to the blog