BLAKE2: Simpler, Smaller, Fast as MD5 View Full Text


Ontology type: schema:Chapter      Open Access: True


Chapter Info

DATE

2013

AUTHORS

Jean-Philippe Aumasson , Samuel Neves , Zooko Wilcox-O’Hearn , Christian Winnerlein

ABSTRACT

We present the hash function BLAKE2, an improved version of the SHA-3 finalist BLAKE optimized for speed in software. Target applications include cloud storage, intrusion detection, or version control systems. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms, and BLAKE2s for smaller architectures. On 64-bit platforms, BLAKE2 is often faster than MD5, yet provides security similar to that of SHA-3: up to 256-bit collision resistance, immunity to length extension, indifferentiability from a random oracle, etc. We specify parallel versions BLAKE2bp and BLAKE2sp that are up to 4 and 8 times faster, by taking advantage of SIMD and/or multiple cores. BLAKE2 reduces the RAM requirements of BLAKE down to 168 bytes, making it smaller than any of the five SHA-3 finalists, and 32% smaller than BLAKE. Finally, BLAKE2 provides a comprehensive support for tree-hashing as well as keyed hashing (be it in sequential or tree mode). More... »

PAGES

119-135

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-38980-1_8

DOI

http://dx.doi.org/10.1007/978-3-642-38980-1_8

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1034905699


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0803", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Computer Software", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Kudelski Security, Switzerland", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Kudelski Security, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Aumasson", 
        "givenName": "Jean-Philippe", 
        "id": "sg:person.012606440341.66", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "University of Coimbra, Portugal", 
          "id": "http://www.grid.ac/institutes/grid.8051.c", 
          "name": [
            "University of Coimbra, Portugal"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Neves", 
        "givenName": "Samuel", 
        "id": "sg:person.011136377232.42", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011136377232.42"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Least Authority Enterprises, USA", 
          "id": "http://www.grid.ac/institutes/None", 
          "name": [
            "Least Authority Enterprises, USA"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Wilcox-O\u2019Hearn", 
        "givenName": "Zooko", 
        "id": "sg:person.013212777477.76", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013212777477.76"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Ludwig Maximilian University of Munich, Germany", 
          "id": "http://www.grid.ac/institutes/grid.5252.0", 
          "name": [
            "Ludwig Maximilian University of Munich, Germany"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Winnerlein", 
        "givenName": "Christian", 
        "type": "Person"
      }
    ], 
    "datePublished": "2013", 
    "datePublishedReg": "2013-01-01", 
    "description": "We present the hash function BLAKE2, an improved version of the SHA-3 finalist BLAKE optimized for speed in software. Target applications include cloud storage, intrusion detection, or version control systems. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms, and BLAKE2s for smaller architectures. On 64-bit platforms, BLAKE2 is often faster than MD5, yet provides security similar to that of SHA-3: up to 256-bit collision resistance, immunity to length extension, indifferentiability from a random oracle, etc. We specify parallel versions BLAKE2bp and BLAKE2sp that are up to 4 and 8 times faster, by taking advantage of SIMD and/or multiple cores. BLAKE2 reduces the RAM requirements of BLAKE down to 168 bytes, making it smaller than any of the five SHA-3 finalists, and 32% smaller than BLAKE. Finally, BLAKE2 provides a comprehensive support for tree-hashing as well as keyed hashing (be it in sequential or tree mode).", 
    "editor": [
      {
        "familyName": "Jacobson", 
        "givenName": "Michael", 
        "type": "Person"
      }, 
      {
        "familyName": "Locasto", 
        "givenName": "Michael", 
        "type": "Person"
      }, 
      {
        "familyName": "Mohassel", 
        "givenName": "Payman", 
        "type": "Person"
      }, 
      {
        "familyName": "Safavi-Naini", 
        "givenName": "Reihaneh", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-38980-1_8", 
    "inLanguage": "en", 
    "isAccessibleForFree": true, 
    "isPartOf": {
      "isbn": [
        "978-3-642-38979-5", 
        "978-3-642-38980-1"
      ], 
      "name": "Applied Cryptography and Network Security", 
      "type": "Book"
    }, 
    "keywords": [
      "advantage of SIMD", 
      "version control systems", 
      "SHA-3 finalists", 
      "SHA-3 finalist BLAKE", 
      "cloud storage", 
      "intrusion detection", 
      "SHA-3", 
      "parallel version", 
      "random oracles", 
      "multiple cores", 
      "RAM requirements", 
      "target application", 
      "small architecture", 
      "BLAKE2", 
      "collision resistance", 
      "MD5", 
      "main flavors", 
      "comprehensive support", 
      "improved version", 
      "control system", 
      "platform", 
      "Blake2b", 
      "SIMD", 
      "bytes", 
      "oracle", 
      "architecture", 
      "security", 
      "software", 
      "version", 
      "indifferentiability", 
      "requirements", 
      "applications", 
      "finalists", 
      "detection", 
      "system", 
      "advantages", 
      "storage", 
      "speed", 
      "extension", 
      "support", 
      "length extension", 
      "time", 
      "core", 
      "keyed", 
      "Blake", 
      "flavor", 
      "immunity", 
      "resistance"
    ], 
    "name": "BLAKE2: Simpler, Smaller, Fast as MD5", 
    "pagination": "119-135", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1034905699"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-38980-1_8"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-38980-1_8", 
      "https://app.dimensions.ai/details/publication/pub.1034905699"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2022-06-01T22:27", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220601/entities/gbq_results/chapter/chapter_115.jsonl", 
    "type": "Chapter", 
    "url": "https://doi.org/10.1007/978-3-642-38980-1_8"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38980-1_8'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38980-1_8'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38980-1_8'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-38980-1_8'


 

This table displays all metadata directly associated to this object as RDF triples.

151 TRIPLES      23 PREDICATES      74 URIs      67 LITERALS      7 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-38980-1_8 schema:about anzsrc-for:08
2 anzsrc-for:0803
3 schema:author Nbdabeb6af55b41449165cf325a70f8bf
4 schema:datePublished 2013
5 schema:datePublishedReg 2013-01-01
6 schema:description We present the hash function BLAKE2, an improved version of the SHA-3 finalist BLAKE optimized for speed in software. Target applications include cloud storage, intrusion detection, or version control systems. BLAKE2 comes in two main flavors: BLAKE2b is optimized for 64-bit platforms, and BLAKE2s for smaller architectures. On 64-bit platforms, BLAKE2 is often faster than MD5, yet provides security similar to that of SHA-3: up to 256-bit collision resistance, immunity to length extension, indifferentiability from a random oracle, etc. We specify parallel versions BLAKE2bp and BLAKE2sp that are up to 4 and 8 times faster, by taking advantage of SIMD and/or multiple cores. BLAKE2 reduces the RAM requirements of BLAKE down to 168 bytes, making it smaller than any of the five SHA-3 finalists, and 32% smaller than BLAKE. Finally, BLAKE2 provides a comprehensive support for tree-hashing as well as keyed hashing (be it in sequential or tree mode).
7 schema:editor N79a6614d879a4ec09a075fdf5bc85b55
8 schema:genre chapter
9 schema:inLanguage en
10 schema:isAccessibleForFree true
11 schema:isPartOf Nc95922c108b24df2920d5a470c84a297
12 schema:keywords BLAKE2
13 Blake
14 Blake2b
15 MD5
16 RAM requirements
17 SHA-3
18 SHA-3 finalist BLAKE
19 SHA-3 finalists
20 SIMD
21 advantage of SIMD
22 advantages
23 applications
24 architecture
25 bytes
26 cloud storage
27 collision resistance
28 comprehensive support
29 control system
30 core
31 detection
32 extension
33 finalists
34 flavor
35 immunity
36 improved version
37 indifferentiability
38 intrusion detection
39 keyed
40 length extension
41 main flavors
42 multiple cores
43 oracle
44 parallel version
45 platform
46 random oracles
47 requirements
48 resistance
49 security
50 small architecture
51 software
52 speed
53 storage
54 support
55 system
56 target application
57 time
58 version
59 version control systems
60 schema:name BLAKE2: Simpler, Smaller, Fast as MD5
61 schema:pagination 119-135
62 schema:productId N7a7c62ccfe574240aa49b2bd90d9275e
63 N9ad3937c6be040568da35d8b85ce9a2e
64 schema:publisher N2c3fd9bce7b64ebea7a78561ed804c39
65 schema:sameAs https://app.dimensions.ai/details/publication/pub.1034905699
66 https://doi.org/10.1007/978-3-642-38980-1_8
67 schema:sdDatePublished 2022-06-01T22:27
68 schema:sdLicense https://scigraph.springernature.com/explorer/license/
69 schema:sdPublisher N6097c062b29c4cc78ca46ff15ef6f9a1
70 schema:url https://doi.org/10.1007/978-3-642-38980-1_8
71 sgo:license sg:explorer/license/
72 sgo:sdDataset chapters
73 rdf:type schema:Chapter
74 N1d4b6cdf2c524f86baebab496f4442c4 rdf:first sg:person.011136377232.42
75 rdf:rest N9e060e8408d843c0a6466f6d6549ae9e
76 N24eba5752ec74bf7b56c6869cabf3d6f schema:familyName Jacobson
77 schema:givenName Michael
78 rdf:type schema:Person
79 N2c3fd9bce7b64ebea7a78561ed804c39 schema:name Springer Nature
80 rdf:type schema:Organisation
81 N2edc4aba98c94c488f0f62981ea5dc8e rdf:first N8912af3eda854261b974e143e0cf11c5
82 rdf:rest N35b5940a112e4b05bd69fcbbd22bd23d
83 N35b5940a112e4b05bd69fcbbd22bd23d rdf:first Nef1290945faa49e6a5c533196f8f83b2
84 rdf:rest rdf:nil
85 N6097c062b29c4cc78ca46ff15ef6f9a1 schema:name Springer Nature - SN SciGraph project
86 rdf:type schema:Organization
87 N79a6614d879a4ec09a075fdf5bc85b55 rdf:first N24eba5752ec74bf7b56c6869cabf3d6f
88 rdf:rest N7d18b22fd8004a7c94f1cb6e1aaf0d6d
89 N7a7c62ccfe574240aa49b2bd90d9275e schema:name doi
90 schema:value 10.1007/978-3-642-38980-1_8
91 rdf:type schema:PropertyValue
92 N7d18b22fd8004a7c94f1cb6e1aaf0d6d rdf:first N8ec943c1675d4de383f7eca36863a9e0
93 rdf:rest N2edc4aba98c94c488f0f62981ea5dc8e
94 N8912af3eda854261b974e143e0cf11c5 schema:familyName Mohassel
95 schema:givenName Payman
96 rdf:type schema:Person
97 N8ec943c1675d4de383f7eca36863a9e0 schema:familyName Locasto
98 schema:givenName Michael
99 rdf:type schema:Person
100 N9ad3937c6be040568da35d8b85ce9a2e schema:name dimensions_id
101 schema:value pub.1034905699
102 rdf:type schema:PropertyValue
103 N9e060e8408d843c0a6466f6d6549ae9e rdf:first sg:person.013212777477.76
104 rdf:rest Nae5ddbfa11c4431188cc0f5700b34366
105 Nae5ddbfa11c4431188cc0f5700b34366 rdf:first Nb8342523a3994426ac887d3341af1140
106 rdf:rest rdf:nil
107 Nb8342523a3994426ac887d3341af1140 schema:affiliation grid-institutes:grid.5252.0
108 schema:familyName Winnerlein
109 schema:givenName Christian
110 rdf:type schema:Person
111 Nbdabeb6af55b41449165cf325a70f8bf rdf:first sg:person.012606440341.66
112 rdf:rest N1d4b6cdf2c524f86baebab496f4442c4
113 Nc95922c108b24df2920d5a470c84a297 schema:isbn 978-3-642-38979-5
114 978-3-642-38980-1
115 schema:name Applied Cryptography and Network Security
116 rdf:type schema:Book
117 Nef1290945faa49e6a5c533196f8f83b2 schema:familyName Safavi-Naini
118 schema:givenName Reihaneh
119 rdf:type schema:Person
120 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
121 schema:name Information and Computing Sciences
122 rdf:type schema:DefinedTerm
123 anzsrc-for:0803 schema:inDefinedTermSet anzsrc-for:
124 schema:name Computer Software
125 rdf:type schema:DefinedTerm
126 sg:person.011136377232.42 schema:affiliation grid-institutes:grid.8051.c
127 schema:familyName Neves
128 schema:givenName Samuel
129 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.011136377232.42
130 rdf:type schema:Person
131 sg:person.012606440341.66 schema:affiliation grid-institutes:None
132 schema:familyName Aumasson
133 schema:givenName Jean-Philippe
134 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66
135 rdf:type schema:Person
136 sg:person.013212777477.76 schema:affiliation grid-institutes:None
137 schema:familyName Wilcox-O’Hearn
138 schema:givenName Zooko
139 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013212777477.76
140 rdf:type schema:Person
141 grid-institutes:None schema:alternateName Kudelski Security, Switzerland
142 Least Authority Enterprises, USA
143 schema:name Kudelski Security, Switzerland
144 Least Authority Enterprises, USA
145 rdf:type schema:Organization
146 grid-institutes:grid.5252.0 schema:alternateName Ludwig Maximilian University of Munich, Germany
147 schema:name Ludwig Maximilian University of Munich, Germany
148 rdf:type schema:Organization
149 grid-institutes:grid.8051.c schema:alternateName University of Coimbra, Portugal
150 schema:name University of Coimbra, Portugal
151 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...