February 22, 2017 By Larry Loeb 2 min read

Many developers consider the Libsodium library the go-to source of application-layer cryptography. It is thought to offer a portable, cross-compilable, easy-to-use library that can be applied to most standard crypto functions such as encryption, decryption, signatures and password hashing.

Now, the PHP core will be bound with the Libsodium cryptography libraries as of version 7.2. This merger is scheduled to emerge toward the end of this year, Bleeping Computer reported.

SHP Problems

The impetus for the change involved a new kind of environment that PHP — which powers at least 82 percent of websites, according to Bleeping Computer — encountered when running the WordPress content management system (CMS). Researchers have found numerous WordPress vulnerabilities of late, and the solution usually includes another PHP extension that functions as a CMS security-oriented extension.

However, problems can arise when using a shared host provider (SHP) rather than kind that provides root access in the cloud by default. SHPs do not want all sorts of PHP extensions roaming throughout their systems because if PHP breaks breaks something, they have to clean up the resulting mess. These limitations could lead to unsecured WordPress environments.

Libsodium Boosts Security

Scott Arciszewski, chief development officer at Paragon Initiative Enterprises, told Bleeping Computer that having all the raw, cryptographical goodness of Libsodium under the hood of PHP will have many salutary effects.

For example, he believes that Libsodium can eliminate the need for the number of PHP extensions otherwise required for a WordPress installation. The basic and secure cryptography, he reasoned, would be supported by default, and WordPress developers will be attracted to the newer and more secure functions.

Arciszewski further explained his reasoning on the Paragon Initiative blog. There he added that PHP’s commitment to cryptography is the first of its kind, and any future developments or similar relationships should only enhance security.

It remains to be seen whether adding Libsodium to PHP will increase the use of cryptography tools and result in more concrete security. However, it’s a step in the right direction for sure.

More from

Are successful deepfake scams more common than we realize?

4 min read - Many times a day worldwide, a boss asks one of their team members to perform a task during a video call. But is the person assigning tasks actually who they say they are? Or is it a deepfake? Instead of blindly following orders, employees must now ask themselves if they are becoming a victims of fraud.Earlier this year, a finance worker found themselves talking on a video meeting with someone who looked and sounded just like their CFO. After the…

How cyberattacks on grocery stores could threaten food security

4 min read - Grocery store shoppers at many chains recently ran into an unwelcome surprise: empty shelves and delayed prescriptions. In early November, Ahold Delhaize USA was the victim of a cyberattack that significantly disrupted operations at more than 2,000 stores, including Hannaford, Food Lion and Stop and Shop. Specific details of the nature of the attack have not yet been publicly released.Because the attack affected many digital systems, some stores were not able to accept credit/debit cards, while others had to shut…

Taking the fight to the enemy: Cyber persistence strategy gains momentum

4 min read - The nature of cyber warfare has evolved rapidly over the last decade, forcing the world’s governments and industries to reimagine their cybersecurity strategies. While deterrence and reactive defenses once dominated the conversation, the emergence of cyber persistence — actively hunting down threats before they materialize — has become the new frontier. This shift, spearheaded by the United States and rapidly adopted by its allies, highlights the realization that defense alone is no longer enough to secure cyberspace.The momentum behind this…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today