SecurePassword is a PHP component for creating strong passwords using modern encryption.
Unlike just using password_hash
or password_verify
, SecurePassword adds a secret entry (commonly called a pepper) to make it difficult to break the generated hash.
PHP >= 8.2
composer require brenno-duarte/php-secure-password
The code below shows an example for creating the hash. The createHash
method generates the password hash along with the "peeper", and the getHash
method returns the generated hash.
use SecurePassword\SecurePassword;
$password = new SecurePassword();
$hash = $password->createHash('my_password')->getHash();
/** Return string */
var_dump($hash);
You can change encryption settings without using the methods that will be listed below. To do this, enter the following code in the constructor:
use SecurePassword\AlgorithmEnum;
$config = [
'algo' => AlgorithmEnum::DEFAULT,
'cost' => 12,
'memory_cost' => PASSWORD_ARGON2_DEFAULT_MEMORY_COST,
'time_cost' => PASSWORD_ARGON2_DEFAULT_TIME_COST,
'threads' => PASSWORD_ARGON2_DEFAULT_THREADS
];
$password = new SecurePassword($config);
You can use the following encryptions: HashAlgorithm::DEFAULT
, HashAlgorithm::BCRYPT
, HashAlgorithm::ARGON2I
, HashAlgorithm::ARGON2ID
.
NOTE: If you are using the settings passed in the constructor then you can ignore the code below.
You can change the type of algorithm used to generate the hash. It is possible to use PASSWORD_BCRYPT
, PASSWORD_ARGON2I
, PASSWORD_ARGON2ID
and even PASSWORD_DEFAULT
.
useDefault()
will use standard encryptionuseBcrypt()
will use Bcrypt encryptionuseArgon2()
will use Argon2 encryptionuseArgon2(true)
passingtrue
will use Argon2d encryption
# standard encryption
$hash = $password->useDefault()->createHash('my_password')->getHash();
# Bcrypt encryption
$hash = $password->useBcrypt()->createHash('my_password')->getHash();
# Argon2 encryption
$hash = $password->useArgon2()->createHash('my_password')->getHash();
# Argon2d encryption (with `true`)
$hash = $password->useArgon2(true)->createHash('my_password')->getHash();
If the type of algorithm is not provided, the default encryption will be 'PASSWORD_DEFAULT'.
To return the information of the created hash, use getHashInfo
method.
$hash = $password->createHash('my_password')->getHashInfo();
/** Return array */
var_dump($hash);
To verify that the hash generated with createHash
is valid, you can use verifyHash
in two ways:
# First way
$hash = $password->createHash('my_password')->getHash();
$res = $password->verifyHash('my_password', $hash);
# Second way
$hash = $password->createHash('my_password')->verifyHash();
/** Return bool */
var_dump($res);
To make timing attacks more difficult, the verifyHash
method waits 0.25 seconds (250000 microseconds) to return the value. You can change this time by changing the third parameter.
# First way
$hash = $password->createHash('my_password')->getHash();
$res = $password->verifyHash('my_password', $hash, 300000);
# Second way
$hash = $password->createHash('my_password')->verifyHash(wait_microseconds: 300000);
/** Return bool */
var_dump($res);
NOTE: If you are using the settings passed in the constructor then you can ignore the code below.
You can change the type of algorithm that will be used to check the hash.
$hash = $password->useArgon2()->createHash('my_password')->getHash();
$res = $password->useArgon2()->verifyHash('my_password', $hash);
/** Return bool */
var_dump($res);
If the encryption type has been changed, you can generate a new hash with the new encryption. The needsHash()
method checks whether the reported hash needs to be regenerated. Otherwise, it will return false
.
Example 1
$password = new SecurePassword();
$hash = $password->useArgon2()->createHash('my_password')->getHash();
$needs = $password->useDefault()->needsRehash('my_password', $hash);
/** Return string */
var_dump($needs);
Example 2
$hash = $password->createHash('my_password')->getHash();
$password = new SecurePassword([
'algo' => AlgorithmEnum::BCRYPT
]);
$needs = $password->needsRehash('my_password', $hash);
/** Return false */
var_dump($needs);
NOTE: If you are using the settings passed in the constructor then you can ignore the code below.
Add options in the useDefault
, useBcrypt
and useArgon2
methods.
- useDefault: default options, use an array.
- useBcrypt: you can change
$cost
. The default is12
. - useArgon2: you can change
$memory_cost
,$time_cost
and$threads
. The default is the constantsPASSWORD_ARGON2_DEFAULT_MEMORY_COST
,PASSWORD_ARGON2_DEFAULT_TIME_COST
andPASSWORD_ARGON2_DEFAULT_THREADS
.
# standard encryption
$hash = $password->useDefault([])->createHash('my_password');
# Bcrypt encryption
$hash = $password->useBcrypt(12)->createHash('my_password');
# Argon2 encryption
$hash = $password->useArgon2(false, PASSWORD_ARGON2_DEFAULT_MEMORY_COST, PASSWORD_ARGON2_DEFAULT_TIME_COST, PASSWORD_ARGON2_DEFAULT_THREADS)->createHash('my_password');
# Argon2d encryption (with `true`)
$hash = $password->useArgon2(true, PASSWORD_ARGON2_DEFAULT_MEMORY_COST, PASSWORD_ARGON2_DEFAULT_TIME_COST, PASSWORD_ARGON2_DEFAULT_THREADS)->createHash('my_password');
Secure Password has the component paragonie/sodium_compat. Therefore, it is not necessary to use the Sodium library in PECL format.
You can use OpenSSL and Sodium encryption using the Encryption
class:
use SecurePassword\Encrypt\Encryption;
$encryption = new Encryption('your-key');
//Encrypt the message
$encrypt = $encryption->encrypt("This is a text");
echo $encrypt;
You can decrypt token by calling decrypt method:
$encryption = new Encryption('your-key');
//Decrypt the message
$decrypt = $encryption->decrypt($encrypt);
echo $decrypt;
You can pass supported adapter to class like:
Use of OpenSSL
$encryption = new Encryption(new OpenSslEncryption('your-key'));
Use of Sodium
$encryption = new Encryption(new SodiumEncryption('your-key'));
Default openSSL will use, you can use any one you want.
It is recommended to change the secret entry (or pepper) that will be added to your password. Use setPepper
to change.
$password = new SecurePassword();
$password->setPepper('new_pepper');
By default, the setPepper
method uses OpenSSL encryption. However, you can use Sodium encryption if you want.
// Use OpenSSL
$password->setPepper('new_pepper', 'openssl');
// Use Sodium
$password->setPepper('new_pepper', 'sodium');
Here's a quick little function that will help you determine what cost parameter you should be using for your server to make sure you are within this range.
$optimal_cost = SecurePassword::getOptimalBcryptCost('my_password');
$password = new SecurePassword([
'cost' => $optimal_cost
]);
$hash = $password->createHash('my_password')->getHash();
MIT