The Hash Function BLAKE View Full Text


Ontology type: schema:Book     


Book Info

DATE

2014

GENRE

Monograph

AUTHORS

Jean-Philippe Aumasson , Willi Meier , Raphael C.-W. Phan , Luca Henzen

PUBLISHER

Springer Nature

ABSTRACT

This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation. In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition, and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as security definitions and state-of-the-art collision search methods, and they present SHA1, SHA2, and the SHA3 finalists. In the chapters that follow, the authors give a complete description of the four instances BLAKE-256, BLAKE-512, BLAKE-224, and BLAKE-384; they describe applications of BLAKE, including simple hashing with or without a salt, and HMAC and PBKDF2 constructions; they review implementation techniques, from portable C and Python to AVR assembly and vectorized code using SIMD CPU instructions; they describe BLAKE’s properties with respect to hardware design for implementation in ASICs or FPGAs; they explain BLAKE's design rationale in detail, from NIST’s requirements to the choice of internal parameters; they summarize the known security properties of BLAKE and describe the best attacks on reduced or modified variants; and they present BLAKE2, the successor of BLAKE, starting with motivations and also covering its performance and security aspects. The book concludes with detailed test vectors, a reference portable C implementation of BLAKE, and a list of third-party software implementations of BLAKE and BLAKE2. The book is oriented towards practice – engineering and craftsmanship – rather than theory. It is suitable for developers, engineers, and security professionals engaged with BLAKE and cryptographic hashing in general, and for applied cryptography researchers and students who need a consolidated reference and a detailed description of the design process, or guidelines on how to design a cryptographic algorithm. More... »

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-662-44757-4

DOI

http://dx.doi.org/10.1007/978-3-662-44757-4

ISBN

978-3-662-44756-7 | 978-3-662-44757-4

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1002536859


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Nagravision SA, Kudelski Security, Cheseaux-sur-Lausanne, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.480244.e", 
          "name": [
            "Nagravision SA, Kudelski Security, Cheseaux-sur-Lausanne, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Aumasson", 
        "givenName": "Jean-Philippe", 
        "id": "sg:person.012606440341.66", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hochschule f\u00fcr Technik, Fachhochschule Nordwestschweiz, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "Hochschule f\u00fcr Technik, Fachhochschule Nordwestschweiz, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Meier", 
        "givenName": "Willi", 
        "id": "sg:person.07653531142.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Faculty of Engineering, Multimedia University, Cyberjaya, Malaysia", 
          "id": "http://www.grid.ac/institutes/grid.411865.f", 
          "name": [
            "Faculty of Engineering, Multimedia University, Cyberjaya, Malaysia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Phan", 
        "givenName": "Raphael C.-W.", 
        "id": "sg:person.014732232610.32", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014732232610.32"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Dept. of IT Security, UBS AG, Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.467609.a", 
          "name": [
            "Dept. of IT Security, UBS AG, Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Henzen", 
        "givenName": "Luca", 
        "id": "sg:person.013220500557.92", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013220500557.92"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2014", 
    "datePublishedReg": "2014-01-01", 
    "description": "This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation. \u00a0 In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition, and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as security definitions and state-of-the-art collision search methods, and they present SHA1, SHA2, and the SHA3 finalists. In the chapters that follow, the authors give a complete description of the four instances BLAKE-256, BLAKE-512, BLAKE-224, and BLAKE-384; they describe applications of BLAKE, including simple hashing with or without a salt, and HMAC and PBKDF2 constructions; they review implementation techniques, from portable C and Python to AVR assembly and vectorized code using SIMD CPU instructions; they describe BLAKE\u2019s properties with respect to hardware design for implementation in ASICs or FPGAs; they explain BLAKE's design rationale in detail, from NIST\u2019s requirements to the choice of internal parameters; they summarize the known security properties of BLAKE and describe the best attacks on reduced or modified variants; and they present BLAKE2, the successor of BLAKE, starting with motivations and also covering its performance and security aspects. The book concludes with detailed test vectors, a reference portable C implementation of BLAKE, and a list of third-party software implementations of BLAKE and BLAKE2. \u00a0 The book is oriented towards practice \u2013 engineering and craftsmanship \u2013 rather than theory. It is suitable for developers, engineers, and security professionals engaged with BLAKE and cryptographic hashing in general, and for applied cryptography researchers and students who need a consolidated reference and a detailed description of the design process, or guidelines on how to design a cryptographic algorithm.", 
    "genre": "monograph", 
    "id": "sg:pub.10.1007/978-3-662-44757-4", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isbn": [
      "978-3-662-44756-7", 
      "978-3-662-44757-4"
    ], 
    "keywords": [
      "cryptographic hashing", 
      "software implementation", 
      "design rationale", 
      "SHA3 competition", 
      "cryptographic algorithms", 
      "security properties", 
      "security aspects", 
      "security definitions", 
      "CPU instructions", 
      "hardware design", 
      "implementation techniques", 
      "NIST requirements", 
      "hashing", 
      "security professionals", 
      "search method", 
      "vectorized code", 
      "BLAKE2", 
      "design process", 
      "developers", 
      "best attack", 
      "BLAKE\u2010256", 
      "implementation", 
      "internal parameters", 
      "test vectors", 
      "SHA2", 
      "basic notions", 
      "HMAC", 
      "SHA1", 
      "requirements", 
      "Python", 
      "FPGA", 
      "algorithm", 
      "short introduction", 
      "applications", 
      "attacks", 
      "code", 
      "ASIC", 
      "engineers", 
      "description", 
      "detailed description", 
      "finalists", 
      "performance", 
      "researchers", 
      "design", 
      "technique", 
      "consolidated reference", 
      "comprehensive description", 
      "vector", 
      "instruction", 
      "list", 
      "definition", 
      "contenders", 
      "method", 
      "notion", 
      "chapter", 
      "construction", 
      "detail", 
      "aspects", 
      "motivation", 
      "authors", 
      "reference", 
      "process", 
      "Popular", 
      "competition", 
      "successor", 
      "focus", 
      "book", 
      "state", 
      "variants", 
      "guidelines", 
      "choice", 
      "parameters", 
      "professionals", 
      "respect", 
      "introduction", 
      "complete description", 
      "craftsmanship", 
      "students", 
      "theory", 
      "Blake", 
      "rationale", 
      "properties", 
      "assembly", 
      "salt", 
      "cryptographic hash function BLAKE", 
      "hash function BLAKE", 
      "function BLAKE", 
      "final contenders", 
      "NIST SHA3 competition", 
      "version popular", 
      "art collision search methods", 
      "collision search methods", 
      "SHA3 finalists", 
      "instances BLAKE-256", 
      "BLAKE-512", 
      "BLAKE-224", 
      "BLAKE-384", 
      "applications of BLAKE", 
      "simple hashing", 
      "PBKDF2 constructions", 
      "AVR assembly", 
      "SIMD CPU instructions", 
      "BLAKE\u2019s properties", 
      "BLAKE's design rationale", 
      "successor of BLAKE", 
      "detailed test vectors", 
      "implementation of BLAKE", 
      "third-party software implementations", 
      "applied cryptography researchers", 
      "cryptography researchers"
    ], 
    "name": "The Hash Function BLAKE", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1002536859"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-662-44757-4"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-662-44757-4", 
      "https://app.dimensions.ai/details/publication/pub.1002536859"
    ], 
    "sdDataset": "books", 
    "sdDatePublished": "2022-01-01T19:05", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220101/entities/gbq_results/book/book_6.jsonl", 
    "type": "Book", 
    "url": "https://doi.org/10.1007/978-3-662-44757-4"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-44757-4'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-44757-4'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-44757-4'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-44757-4'


 

This table displays all metadata directly associated to this object as RDF triples.

190 TRIPLES      21 PREDICATES      135 URIs      128 LITERALS      5 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-662-44757-4 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N14b908c7775c402fb0f8e6cbf6b200ad
4 schema:datePublished 2014
5 schema:datePublishedReg 2014-01-01
6 schema:description This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation.   In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition, and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as security definitions and state-of-the-art collision search methods, and they present SHA1, SHA2, and the SHA3 finalists. In the chapters that follow, the authors give a complete description of the four instances BLAKE-256, BLAKE-512, BLAKE-224, and BLAKE-384; they describe applications of BLAKE, including simple hashing with or without a salt, and HMAC and PBKDF2 constructions; they review implementation techniques, from portable C and Python to AVR assembly and vectorized code using SIMD CPU instructions; they describe BLAKE’s properties with respect to hardware design for implementation in ASICs or FPGAs; they explain BLAKE's design rationale in detail, from NIST’s requirements to the choice of internal parameters; they summarize the known security properties of BLAKE and describe the best attacks on reduced or modified variants; and they present BLAKE2, the successor of BLAKE, starting with motivations and also covering its performance and security aspects. The book concludes with detailed test vectors, a reference portable C implementation of BLAKE, and a list of third-party software implementations of BLAKE and BLAKE2.   The book is oriented towards practice – engineering and craftsmanship – rather than theory. It is suitable for developers, engineers, and security professionals engaged with BLAKE and cryptographic hashing in general, and for applied cryptography researchers and students who need a consolidated reference and a detailed description of the design process, or guidelines on how to design a cryptographic algorithm.
7 schema:genre monograph
8 schema:inLanguage en
9 schema:isAccessibleForFree false
10 schema:isbn 978-3-662-44756-7
11 978-3-662-44757-4
12 schema:keywords ASIC
13 AVR assembly
14 BLAKE's design rationale
15 BLAKE-224
16 BLAKE-384
17 BLAKE-512
18 BLAKE2
19 BLAKE‐256
20 BLAKE’s properties
21 Blake
22 CPU instructions
23 FPGA
24 HMAC
25 NIST SHA3 competition
26 NIST requirements
27 PBKDF2 constructions
28 Popular
29 Python
30 SHA1
31 SHA2
32 SHA3 competition
33 SHA3 finalists
34 SIMD CPU instructions
35 algorithm
36 applications
37 applications of BLAKE
38 applied cryptography researchers
39 art collision search methods
40 aspects
41 assembly
42 attacks
43 authors
44 basic notions
45 best attack
46 book
47 chapter
48 choice
49 code
50 collision search methods
51 competition
52 complete description
53 comprehensive description
54 consolidated reference
55 construction
56 contenders
57 craftsmanship
58 cryptographic algorithms
59 cryptographic hash function BLAKE
60 cryptographic hashing
61 cryptography researchers
62 definition
63 description
64 design
65 design process
66 design rationale
67 detail
68 detailed description
69 detailed test vectors
70 developers
71 engineers
72 final contenders
73 finalists
74 focus
75 function BLAKE
76 guidelines
77 hardware design
78 hash function BLAKE
79 hashing
80 implementation
81 implementation of BLAKE
82 implementation techniques
83 instances BLAKE-256
84 instruction
85 internal parameters
86 introduction
87 list
88 method
89 motivation
90 notion
91 parameters
92 performance
93 process
94 professionals
95 properties
96 rationale
97 reference
98 requirements
99 researchers
100 respect
101 salt
102 search method
103 security aspects
104 security definitions
105 security professionals
106 security properties
107 short introduction
108 simple hashing
109 software implementation
110 state
111 students
112 successor
113 successor of BLAKE
114 technique
115 test vectors
116 theory
117 third-party software implementations
118 variants
119 vector
120 vectorized code
121 version popular
122 schema:name The Hash Function BLAKE
123 schema:productId Nbef134104c5c4f3b925a8b6d6cbbf4d6
124 Nd71bd75951c749fcbc38885577c30dbe
125 schema:publisher N60314885796742e6a08bb1b1e67c007a
126 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002536859
127 https://doi.org/10.1007/978-3-662-44757-4
128 schema:sdDatePublished 2022-01-01T19:05
129 schema:sdLicense https://scigraph.springernature.com/explorer/license/
130 schema:sdPublisher N6d37e34aa92a4cbfb9a150c50d0a4429
131 schema:url https://doi.org/10.1007/978-3-662-44757-4
132 sgo:license sg:explorer/license/
133 sgo:sdDataset books
134 rdf:type schema:Book
135 N14b908c7775c402fb0f8e6cbf6b200ad rdf:first sg:person.012606440341.66
136 rdf:rest N4bef1a82b3e04e5ca746fd3e66176f18
137 N4bef1a82b3e04e5ca746fd3e66176f18 rdf:first sg:person.07653531142.18
138 rdf:rest N87e486c4a2b64d43a9ebd01c0096d320
139 N60314885796742e6a08bb1b1e67c007a schema:name Springer Nature
140 rdf:type schema:Organisation
141 N6d37e34aa92a4cbfb9a150c50d0a4429 schema:name Springer Nature - SN SciGraph project
142 rdf:type schema:Organization
143 N8188ba2ddfc14134a5d829f192c5aeeb rdf:first sg:person.013220500557.92
144 rdf:rest rdf:nil
145 N87e486c4a2b64d43a9ebd01c0096d320 rdf:first sg:person.014732232610.32
146 rdf:rest N8188ba2ddfc14134a5d829f192c5aeeb
147 Nbef134104c5c4f3b925a8b6d6cbbf4d6 schema:name doi
148 schema:value 10.1007/978-3-662-44757-4
149 rdf:type schema:PropertyValue
150 Nd71bd75951c749fcbc38885577c30dbe schema:name dimensions_id
151 schema:value pub.1002536859
152 rdf:type schema:PropertyValue
153 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
154 schema:name Information and Computing Sciences
155 rdf:type schema:DefinedTerm
156 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
157 schema:name Data Format
158 rdf:type schema:DefinedTerm
159 sg:person.012606440341.66 schema:affiliation grid-institutes:grid.480244.e
160 schema:familyName Aumasson
161 schema:givenName Jean-Philippe
162 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66
163 rdf:type schema:Person
164 sg:person.013220500557.92 schema:affiliation grid-institutes:grid.467609.a
165 schema:familyName Henzen
166 schema:givenName Luca
167 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013220500557.92
168 rdf:type schema:Person
169 sg:person.014732232610.32 schema:affiliation grid-institutes:grid.411865.f
170 schema:familyName Phan
171 schema:givenName Raphael C.-W.
172 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014732232610.32
173 rdf:type schema:Person
174 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
175 schema:familyName Meier
176 schema:givenName Willi
177 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
178 rdf:type schema:Person
179 grid-institutes:grid.410380.e schema:alternateName Hochschule für Technik, Fachhochschule Nordwestschweiz, Windisch, Switzerland
180 schema:name Hochschule für Technik, Fachhochschule Nordwestschweiz, Windisch, Switzerland
181 rdf:type schema:Organization
182 grid-institutes:grid.411865.f schema:alternateName Faculty of Engineering, Multimedia University, Cyberjaya, Malaysia
183 schema:name Faculty of Engineering, Multimedia University, Cyberjaya, Malaysia
184 rdf:type schema:Organization
185 grid-institutes:grid.467609.a schema:alternateName Dept. of IT Security, UBS AG, Zürich, Switzerland
186 schema:name Dept. of IT Security, UBS AG, Zürich, Switzerland
187 rdf:type schema:Organization
188 grid-institutes:grid.480244.e schema:alternateName Nagravision SA, Kudelski Security, Cheseaux-sur-Lausanne, Switzerland
189 schema:name Nagravision SA, Kudelski Security, Cheseaux-sur-Lausanne, Switzerland
190 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...