PHC call for submissions

The Password Hashing Competition (PHC) organizers solicit proposals from any interested party for candidate password hashing schemes, to be considered for inclusion in a portfolio of schemes suitable for widespread adoption, and covering a broad range of applications.

Submissions are due by March 31, 2014. All submissions received that comply with the submission requirements below will be made available on the website of the project,

Technical guidelines

The submitted password hashing scheme should take as input at least The scheme should be able to produce (but is not limited to) 32-byte outputs. If multiple output lengths are supported, the output length should be a parameter of the scheme. Similarly, if multiple salt lengths are supported, the salt length should be a parameter. Passwords longer than 128 bytes may be supported, but that is not mandatory.
Other optional inputs include local parameters such as a personalization string, a secret key, or any application-specific parameter.

Submissions will be evaluated according the following criteria:




Submitters are encouraged to propose innovative constructions and methods for protecting passwords against attackers that have fully or partially compromised a server storing password hashes. For example, one may design a scheme that is slow to evaluate except on a server given some server-specific shortcut.
Submissions may also be specific to a specific application, such as mobile devices (e.g. to protect PINs), key derivation (e.g. for full-disk encryption), scripting languages (as opposed to native implementations), etc.

Submission requirements

Submissions should be sent to on or before March 31, 2014 as a compressed archive (tar.bz2, tar.gz, or zip). All submissions will be acknowledged.

The following are to be provided with any submission:

Cover sheet


Initial security analysis

Efficiency analysis


Intellectual property statement

Statement that the scheme is and will remain available worldwide on a royalty free basis, and that the designer is unaware of any patent or patent application that covers the use or implementation of the submitted algorithm.