Using Libsodium in PHP Projects

A guide to using the libsodium PHP extension for modern, secure, and fast cryptography. Open Source.

Password Hashing

Before you decide whether or not to use a feature, check the quick reference page, which explains what each function does and where each should be used.

(Copied From the Libsodium documentation):

Secret keys used to encrypt or sign confidential data have to be chosen from a very large keyspace. However, passwords are usually short, human-generated strings, making dictionary attacks practical.

The pwhash operation derives a secret key of any size from a password and a salt.

  • The generated key has the size defined by the application, no matter what the password length is.
  • The same password hashed with same parameters will always produce the same key.
  • The same password hashed with different salts will produce different keys.
  • The function deriving a key from a password and a salt is CPU intensive and intentionally requires a fair amount of memory. Therefore, it mitigates brute-force attacks by requiring a significant effort to verify each password.

Common use cases:

  • Protecting an on-disk secret key with a password,
  • Password storage, or rather: storing what it takes to verify a password without having to store the actual password.

To view the old API documentation, click here.

Argon2i Password Hashing and Verification

string sodium_crypto_pwhash_str(string $password, int $opslimit, int $memlimit)

This uses the Argon2i key derivation function to generate a storable password hash. It's highly recommended that you use the provided constants for $opslimit and $memlimit.

// hash the password and return an ASCII string suitable for storage
$hash_str = sodium_crypto_pwhash_str(

bool sodium_crypto_pwhash_str_verify(string $hash_str, string $password)

Returns TRUE if the password matches the given hash.

if (sodium_crypto_pwhash_str_verify($hash_str, $password)) {
    // recommended: wipe the plaintext password from memory
    // Password was valid
} else {
    // recommended: wipe the plaintext password from memory
    // Password was invalid.

Argon2i Key Derivation

string sodium_crypto_pwhash(int $output_length, string $password, string $salt, int $opslimit, int $memlimit)

If you need to derive an encryption key (e.g. for crypto_sign_seed_keypair()) from a user-provided password, you can invoke this function directly.

For each key, you must use a unique and unpredictable salt (which should be stored for re-use).

// create a random salt

And then you can derive your cryptographic key from your password like so:

$seed = sodium_crypto_pwhash(

Extra Information