scrypt bcrypt argon
#1
https://en.wikipedia.org/wiki/Password_H...ompetition

A Example how scrypt, bcrypt and argon looks like: Password is "99" without ".

bcypt (10 rounds)
Code:
$2y$10$B6OS6R3yHJC8DOxGok9YAuxQNoCKT.1GBm6NCs4jhTR3lfACJI0YS

argon (2048 kb, timecost 5, threads 5)
Code:
$argon2i$v=19$m=2048,t=5,p=5$bEpYekVKUDY4TWhtdGJNNA$OO4zQ9JmMKIAmalSuJXwqC3ddsNdN/IHKWF4csfb950


Will there be possibilities to crack the newer hashes in the future via HaschKatze?
Or finding vulnĀ“s in hashes?