Investigation of Practical Attacks on the Argon 2 i Memory-hard Hash Function 6

4 Background 4 4.1 The Argon2 Hash . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4 4.1.1 The Compression Function H . . . . . . . . . . . . . . . . . 5 4.1.2 Indexing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6 4.1.3 Revisions Made to Argon2i-A . . . . . . . . . . . . . . . . . 6 4.1.4 Simplifying Assumptions… (More)