February 22, 2017 By Larry Loeb 2 min read

Many developers consider the Libsodium library the go-to source of application-layer cryptography. It is thought to offer a portable, cross-compilable, easy-to-use library that can be applied to most standard crypto functions such as encryption, decryption, signatures and password hashing.

Now, the PHP core will be bound with the Libsodium cryptography libraries as of version 7.2. This merger is scheduled to emerge toward the end of this year, Bleeping Computer reported.

SHP Problems

The impetus for the change involved a new kind of environment that PHP — which powers at least 82 percent of websites, according to Bleeping Computer — encountered when running the WordPress content management system (CMS). Researchers have found numerous WordPress vulnerabilities of late, and the solution usually includes another PHP extension that functions as a CMS security-oriented extension.

However, problems can arise when using a shared host provider (SHP) rather than kind that provides root access in the cloud by default. SHPs do not want all sorts of PHP extensions roaming throughout their systems because if PHP breaks breaks something, they have to clean up the resulting mess. These limitations could lead to unsecured WordPress environments.

Libsodium Boosts Security

Scott Arciszewski, chief development officer at Paragon Initiative Enterprises, told Bleeping Computer that having all the raw, cryptographical goodness of Libsodium under the hood of PHP will have many salutary effects.

For example, he believes that Libsodium can eliminate the need for the number of PHP extensions otherwise required for a WordPress installation. The basic and secure cryptography, he reasoned, would be supported by default, and WordPress developers will be attracted to the newer and more secure functions.

Arciszewski further explained his reasoning on the Paragon Initiative blog. There he added that PHP’s commitment to cryptography is the first of its kind, and any future developments or similar relationships should only enhance security.

It remains to be seen whether adding Libsodium to PHP will increase the use of cryptography tools and result in more concrete security. However, it’s a step in the right direction for sure.

More from

Passwords, passkeys and familiarity bias

5 min read - As passkey (passwordless authentication) adoption proceeds, misconceptions abound. There appears to be a widespread impression that passkeys may be more convenient and less secure than passwords. The reality is that they are both more secure and more convenient — possibly a first in cybersecurity.Most of us could be forgiven for not realizing passwordless authentication is more secure than passwords. Thinking back to the first couple of use cases I was exposed to — a phone operating system (OS) and a…

DOD establishes Office of the Assistant Secretary of Defense for Cyber Policy

2 min read - The federal government recently took a new step toward prioritizing cybersecurity and demonstrating its commitment to reducing risk. On March 20, 2024, the Pentagon formally established the new Office of the Assistant Secretary of Defense for Cyber Policy to supervise cyber policy for the Department of Defense. The next day, President Joe Biden announced Michael Sulmeyer as his nominee for the role.“In standing up this office, the Department is giving cyber the focus and attention that Congress intended,” said Acting…

Unpacking the NIST cybersecurity framework 2.0

4 min read - The NIST cybersecurity framework (CSF) helps organizations improve risk management using common language that focuses on business drivers to enhance cybersecurity.NIST CSF 1.0 was released in February 2014, and version 1.1 in April 2018. In February 2024, NIST released its newest CSF iteration: 2.0. The journey to CSF 2.0 began with a request for information (RFI) in February 2022. Over the next two years, NIST engaged the cybersecurity community through analysis, workshops, comments and draft revision to refine existing standards…

Topic updates

Get email updates and stay ahead of the latest threats to the security landscape, thought leadership and research.
Subscribe today