Why I Use Argon2id Instead of bcrypt for PDF Encryption Keys
rust
dev.to
All tests run on an 8-year-old MacBook Air. When you encrypt a PDF with a password, that password needs to become a 32-byte key. How you do that conversion matters more than most people realize. The problem with bcrypt bcrypt is fine for password hashing. It's not designed for key derivation. Output is fixed at 60 characters — not suitable as a raw encryption key Memory usage is low, making GPU-based brute force cheap No built-in support for generating arbitrary-length keys