December 5, 2017 By Mark Samuels 2 min read

PHP received a shot in the arm with the release of a new version of the programming language that provides support for an improved password hashing algorithm and includes high-speed cryptography.

The release of PHP 7.2 includes support for the algorithm Argon2 and provides strong benefits in comparison to existing techniques. The update to the PHP programming language also replaces an outmoded cryptographic library with a modern version known as Libsodium.

Developers and IT decision-makes should view the update as welcome news since many business websites still rely on PHP programming techniques.

Understanding the Benefits of Argon2

The password hashing algorithm Argon2 has been added to the newly updated PHP core. Password hashing is one of the most basic security elements developers must consider when designing applications that accept passwords from users.

A strong hashing algorithm reduces the risk of an attacker being able to determine the original password while still allowing a database to compare the resulting hash in the long term. Argon2 is believed to offer a better alternative to bcrypt, Bleeping Computer reported, in terms of both cost efficiency and security.

Argon2, which defeated more than 20 algorithms to win the Password Hashing Competition in 2015, is now recognized as a universal internet standard by the Internet Engineering Task Force (IETF), according to Bleeping Computer. It is also ideal for the data-based protective measures used in cryptocurrencies.

The Plus Points of Libsodium

The PHP development team announced the availability of PHP 7.2 at the end of November. The release includes a range of improvements in addition to the inclusion of Argon2.

Among the most notable of these advancements was the ejection of the mcrypt cryptographic library from the core and its replacement with Libsodium. PHP’s developers have previously suggested that mcrypt, which was last updated almost a decade ago, was inhibiting the growth of the language and should be removed as quickly as possible.

InfoWorld reported that the Libsodium cryptography library is now a core extension in PHP 7.2 and provides high-speed elliptic cryptography.

Protecting Users and Data From PHP Programming Flaws

Late last year, security specialists unearthed three PHP vulnerabilities that could have had serious consequences for organizations and consumers worldwide. Then, earlier this year, reports surfaced about a rootkit that hides inside a PHP module and attacks servers through Apache modules. That was followed by fears that unfinished installations of WordPress could give attackers admin access.

IT managers must be aware of these risks and welcome the updated version of PHP. The Libsodium library should be developers’ go-to source for application-layer cryptography. Its addition to PHP is a crucial step toward implementing more concrete security for the programming language.

More from

When ransomware kills: Attacks on healthcare facilities

4 min read - As ransomware attacks continue to escalate, their toll is often measured in data loss and financial strain. But what about the loss of human life? Nowhere is the ransomware threat more acute than in the healthcare sector, where patients’ lives are literally on the line.Since 2015, there has been a staggering increase in ransomware attacks on healthcare facilities. And the impacts are severe: Diverted emergency services, delayed critical treatments and even fatalities. Meanwhile, the pledge some ransomware groups made during…

AI and cloud vulnerabilities aren’t the only threats facing CISOs today

6 min read - With cloud infrastructure and, more recently, artificial intelligence (AI) systems becoming prime targets for attackers, security leaders are laser-focused on defending these high-profile areas. They’re right to do so, too, as cyber criminals turn to new and emerging technologies to launch and scale ever more sophisticated attacks.However, this heightened attention to emerging threats makes it easy to overlook traditional attack vectors, such as human-driven social engineering and vulnerabilities in physical security.As adversaries exploit an ever-wider range of potential entry points…

4 trends in software supply chain security

4 min read - Some of the biggest and most infamous cyberattacks of the past decade were caused by a security breakdown in the software supply chain. SolarWinds was probably the most well-known, but it was not alone. Incidents against companies like Equifax and tools like MOVEit also wreaked havoc for organizations and customers whose sensitive information was compromised.Expect to see more software supply chain attacks moving forward. According to ReversingLabs' The State of Software Supply Chain Security 2024 study, attacks against the software…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today