The Hash Function BLAKE View Full Text


Ontology type: schema:Book     


Book Info

DATE

2014

GENRE

Monograph

AUTHORS

Jean-Philippe Aumasson , Willi Meier , Raphael C.-W. Phan , Luca Henzen

PUBLISHER

Springer Nature

ABSTRACT

This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation. In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition, and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as security definitions and state-of-the-art collision search methods, and they present SHA1, SHA2, and the SHA3 finalists. In the chapters that follow, the authors give a complete description of the four instances BLAKE-256, BLAKE-512, BLAKE-224, and BLAKE-384; they describe applications of BLAKE, including simple hashing with or without a salt, and HMAC and PBKDF2 constructions; they review implementation techniques, from portable C and Python to AVR assembly and vectorized code using SIMD CPU instructions; they describe BLAKE’s properties with respect to hardware design for implementation in ASICs or FPGAs; they explain BLAKE's design rationale in detail, from NIST’s requirements to the choice of internal parameters; they summarize the known security properties of BLAKE and describe the best attacks on reduced or modified variants; and they present BLAKE2, the successor of BLAKE, starting with motivations and also covering its performance and security aspects. The book concludes with detailed test vectors, a reference portable C implementation of BLAKE, and a list of third-party software implementations of BLAKE and BLAKE2. The book is oriented towards practice – engineering and craftsmanship – rather than theory. It is suitable for developers, engineers, and security professionals engaged with BLAKE and cryptographic hashing in general, and for applied cryptography researchers and students who need a consolidated reference and a detailed description of the design process, or guidelines on how to design a cryptographic algorithm. More... »

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-662-44757-4

DOI

http://dx.doi.org/10.1007/978-3-662-44757-4

ISBN

978-3-662-44756-7 | 978-3-662-44757-4

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1002536859


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/08", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Information and Computing Sciences", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/0804", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Data Format", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "Nagravision SA, Kudelski Security, Cheseaux-sur-Lausanne, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.480244.e", 
          "name": [
            "Nagravision SA, Kudelski Security, Cheseaux-sur-Lausanne, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Aumasson", 
        "givenName": "Jean-Philippe", 
        "id": "sg:person.012606440341.66", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Hochschule f\u00fcr Technik, Fachhochschule Nordwestschweiz, Windisch, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.410380.e", 
          "name": [
            "Hochschule f\u00fcr Technik, Fachhochschule Nordwestschweiz, Windisch, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Meier", 
        "givenName": "Willi", 
        "id": "sg:person.07653531142.18", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Faculty of Engineering, Multimedia University, Cyberjaya, Malaysia", 
          "id": "http://www.grid.ac/institutes/grid.411865.f", 
          "name": [
            "Faculty of Engineering, Multimedia University, Cyberjaya, Malaysia"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Phan", 
        "givenName": "Raphael C.-W.", 
        "id": "sg:person.014732232610.32", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014732232610.32"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "Dept. of IT Security, UBS AG, Z\u00fcrich, Switzerland", 
          "id": "http://www.grid.ac/institutes/grid.467609.a", 
          "name": [
            "Dept. of IT Security, UBS AG, Z\u00fcrich, Switzerland"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Henzen", 
        "givenName": "Luca", 
        "id": "sg:person.013220500557.92", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013220500557.92"
        ], 
        "type": "Person"
      }
    ], 
    "datePublished": "2014", 
    "datePublishedReg": "2014-01-01", 
    "description": "This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation. \u00a0 In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition, and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as security definitions and state-of-the-art collision search methods, and they present SHA1, SHA2, and the SHA3 finalists. In the chapters that follow, the authors give a complete description of the four instances BLAKE-256, BLAKE-512, BLAKE-224, and BLAKE-384; they describe applications of BLAKE, including simple hashing with or without a salt, and HMAC and PBKDF2 constructions; they review implementation techniques, from portable C and Python to AVR assembly and vectorized code using SIMD CPU instructions; they describe BLAKE\u2019s properties with respect to hardware design for implementation in ASICs or FPGAs; they explain BLAKE's design rationale in detail, from NIST\u2019s requirements to the choice of internal parameters; they summarize the known security properties of BLAKE and describe the best attacks on reduced or modified variants; and they present BLAKE2, the successor of BLAKE, starting with motivations and also covering its performance and security aspects. The book concludes with detailed test vectors, a reference portable C implementation of BLAKE, and a list of third-party software implementations of BLAKE and BLAKE2. \u00a0 The book is oriented towards practice \u2013 engineering and craftsmanship \u2013 rather than theory. It is suitable for developers, engineers, and security professionals engaged with BLAKE and cryptographic hashing in general, and for applied cryptography researchers and students who need a consolidated reference and a detailed description of the design process, or guidelines on how to design a cryptographic algorithm.", 
    "genre": "monograph", 
    "id": "sg:pub.10.1007/978-3-662-44757-4", 
    "inLanguage": "en", 
    "isAccessibleForFree": false, 
    "isbn": [
      "978-3-662-44756-7", 
      "978-3-662-44757-4"
    ], 
    "keywords": [
      "cryptographic hashing", 
      "software implementation", 
      "design rationale", 
      "SHA3 competition", 
      "cryptographic algorithms", 
      "security properties", 
      "security aspects", 
      "security definitions", 
      "CPU instructions", 
      "hardware design", 
      "C implementation", 
      "implementation techniques", 
      "hashing", 
      "security professionals", 
      "NIST requirements", 
      "search method", 
      "vectorized code", 
      "BLAKE2", 
      "design process", 
      "developers", 
      "best attack", 
      "implementation", 
      "test vectors", 
      "internal parameters", 
      "SHA2", 
      "HMAC", 
      "basic notions", 
      "SHA1", 
      "requirements", 
      "Python", 
      "FPGA", 
      "consolidated reference", 
      "algorithm", 
      "BLAKE\u2010256", 
      "applications", 
      "short introduction", 
      "attacks", 
      "code", 
      "ASIC", 
      "engineers", 
      "description", 
      "finalists", 
      "detailed description", 
      "performance", 
      "researchers", 
      "design", 
      "technique", 
      "comprehensive description", 
      "vector", 
      "instruction", 
      "list", 
      "chapter", 
      "definition", 
      "method", 
      "contenders", 
      "notion", 
      "construction", 
      "detail", 
      "aspects", 
      "motivation", 
      "authors", 
      "process", 
      "competition", 
      "successor", 
      "Popular", 
      "focus", 
      "state", 
      "variants", 
      "book", 
      "guidelines", 
      "choice", 
      "professionals", 
      "craftsmanship", 
      "reference", 
      "parameters", 
      "introduction", 
      "respect", 
      "complete description", 
      "students", 
      "theory", 
      "Blake", 
      "rationale", 
      "properties", 
      "assembly", 
      "salt"
    ], 
    "name": "The Hash Function BLAKE", 
    "productId": [
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1002536859"
        ]
      }, 
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-662-44757-4"
        ]
      }
    ], 
    "publisher": {
      "name": "Springer Nature", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-662-44757-4", 
      "https://app.dimensions.ai/details/publication/pub.1002536859"
    ], 
    "sdDataset": "books", 
    "sdDatePublished": "2022-05-20T07:40", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-springernature-scigraph/baseset/20220519/entities/gbq_results/book/book_23.jsonl", 
    "type": "Book", 
    "url": "https://doi.org/10.1007/978-3-662-44757-4"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-44757-4'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-44757-4'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-44757-4'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-662-44757-4'


 

This table displays all metadata directly associated to this object as RDF triples.

165 TRIPLES      21 PREDICATES      110 URIs      103 LITERALS      5 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-662-44757-4 schema:about anzsrc-for:08
2 anzsrc-for:0804
3 schema:author N987dd594c5604c9d87aac0e65c079da5
4 schema:datePublished 2014
5 schema:datePublishedReg 2014-01-01
6 schema:description This is a comprehensive description of the cryptographic hash function BLAKE, one of the five final contenders in the NIST SHA3 competition, and of BLAKE2, an improved version popular among developers. It describes how BLAKE was designed and why BLAKE2 was developed, and it offers guidelines on implementing and using BLAKE, with a focus on software implementation.   In the first two chapters, the authors offer a short introduction to cryptographic hashing, the SHA3 competition, and BLAKE. They review applications of cryptographic hashing, they describe some basic notions such as security definitions and state-of-the-art collision search methods, and they present SHA1, SHA2, and the SHA3 finalists. In the chapters that follow, the authors give a complete description of the four instances BLAKE-256, BLAKE-512, BLAKE-224, and BLAKE-384; they describe applications of BLAKE, including simple hashing with or without a salt, and HMAC and PBKDF2 constructions; they review implementation techniques, from portable C and Python to AVR assembly and vectorized code using SIMD CPU instructions; they describe BLAKE’s properties with respect to hardware design for implementation in ASICs or FPGAs; they explain BLAKE's design rationale in detail, from NIST’s requirements to the choice of internal parameters; they summarize the known security properties of BLAKE and describe the best attacks on reduced or modified variants; and they present BLAKE2, the successor of BLAKE, starting with motivations and also covering its performance and security aspects. The book concludes with detailed test vectors, a reference portable C implementation of BLAKE, and a list of third-party software implementations of BLAKE and BLAKE2.   The book is oriented towards practice – engineering and craftsmanship – rather than theory. It is suitable for developers, engineers, and security professionals engaged with BLAKE and cryptographic hashing in general, and for applied cryptography researchers and students who need a consolidated reference and a detailed description of the design process, or guidelines on how to design a cryptographic algorithm.
7 schema:genre monograph
8 schema:inLanguage en
9 schema:isAccessibleForFree false
10 schema:isbn 978-3-662-44756-7
11 978-3-662-44757-4
12 schema:keywords ASIC
13 BLAKE2
14 BLAKE‐256
15 Blake
16 C implementation
17 CPU instructions
18 FPGA
19 HMAC
20 NIST requirements
21 Popular
22 Python
23 SHA1
24 SHA2
25 SHA3 competition
26 algorithm
27 applications
28 aspects
29 assembly
30 attacks
31 authors
32 basic notions
33 best attack
34 book
35 chapter
36 choice
37 code
38 competition
39 complete description
40 comprehensive description
41 consolidated reference
42 construction
43 contenders
44 craftsmanship
45 cryptographic algorithms
46 cryptographic hashing
47 definition
48 description
49 design
50 design process
51 design rationale
52 detail
53 detailed description
54 developers
55 engineers
56 finalists
57 focus
58 guidelines
59 hardware design
60 hashing
61 implementation
62 implementation techniques
63 instruction
64 internal parameters
65 introduction
66 list
67 method
68 motivation
69 notion
70 parameters
71 performance
72 process
73 professionals
74 properties
75 rationale
76 reference
77 requirements
78 researchers
79 respect
80 salt
81 search method
82 security aspects
83 security definitions
84 security professionals
85 security properties
86 short introduction
87 software implementation
88 state
89 students
90 successor
91 technique
92 test vectors
93 theory
94 variants
95 vector
96 vectorized code
97 schema:name The Hash Function BLAKE
98 schema:productId N2b058732be1841b689d4e80f404bcc08
99 N624fcb7e9f7f466db7e6693995b71715
100 schema:publisher N0a8ce964d46f4b86b219d83e5dc9dc03
101 schema:sameAs https://app.dimensions.ai/details/publication/pub.1002536859
102 https://doi.org/10.1007/978-3-662-44757-4
103 schema:sdDatePublished 2022-05-20T07:40
104 schema:sdLicense https://scigraph.springernature.com/explorer/license/
105 schema:sdPublisher N8c760f0f9f4947de8a8cef0b9dfaf28d
106 schema:url https://doi.org/10.1007/978-3-662-44757-4
107 sgo:license sg:explorer/license/
108 sgo:sdDataset books
109 rdf:type schema:Book
110 N092643e215b34f659fe92eccc1a141a6 rdf:first sg:person.014732232610.32
111 rdf:rest N74bfb376153b4aedaea21186e73ea9c4
112 N0a8ce964d46f4b86b219d83e5dc9dc03 schema:name Springer Nature
113 rdf:type schema:Organisation
114 N2b058732be1841b689d4e80f404bcc08 schema:name dimensions_id
115 schema:value pub.1002536859
116 rdf:type schema:PropertyValue
117 N624fcb7e9f7f466db7e6693995b71715 schema:name doi
118 schema:value 10.1007/978-3-662-44757-4
119 rdf:type schema:PropertyValue
120 N74bfb376153b4aedaea21186e73ea9c4 rdf:first sg:person.013220500557.92
121 rdf:rest rdf:nil
122 N8c760f0f9f4947de8a8cef0b9dfaf28d schema:name Springer Nature - SN SciGraph project
123 rdf:type schema:Organization
124 N987dd594c5604c9d87aac0e65c079da5 rdf:first sg:person.012606440341.66
125 rdf:rest Nd2013ad3bc6a4d0194df99e0e492c451
126 Nd2013ad3bc6a4d0194df99e0e492c451 rdf:first sg:person.07653531142.18
127 rdf:rest N092643e215b34f659fe92eccc1a141a6
128 anzsrc-for:08 schema:inDefinedTermSet anzsrc-for:
129 schema:name Information and Computing Sciences
130 rdf:type schema:DefinedTerm
131 anzsrc-for:0804 schema:inDefinedTermSet anzsrc-for:
132 schema:name Data Format
133 rdf:type schema:DefinedTerm
134 sg:person.012606440341.66 schema:affiliation grid-institutes:grid.480244.e
135 schema:familyName Aumasson
136 schema:givenName Jean-Philippe
137 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.012606440341.66
138 rdf:type schema:Person
139 sg:person.013220500557.92 schema:affiliation grid-institutes:grid.467609.a
140 schema:familyName Henzen
141 schema:givenName Luca
142 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.013220500557.92
143 rdf:type schema:Person
144 sg:person.014732232610.32 schema:affiliation grid-institutes:grid.411865.f
145 schema:familyName Phan
146 schema:givenName Raphael C.-W.
147 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014732232610.32
148 rdf:type schema:Person
149 sg:person.07653531142.18 schema:affiliation grid-institutes:grid.410380.e
150 schema:familyName Meier
151 schema:givenName Willi
152 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.07653531142.18
153 rdf:type schema:Person
154 grid-institutes:grid.410380.e schema:alternateName Hochschule für Technik, Fachhochschule Nordwestschweiz, Windisch, Switzerland
155 schema:name Hochschule für Technik, Fachhochschule Nordwestschweiz, Windisch, Switzerland
156 rdf:type schema:Organization
157 grid-institutes:grid.411865.f schema:alternateName Faculty of Engineering, Multimedia University, Cyberjaya, Malaysia
158 schema:name Faculty of Engineering, Multimedia University, Cyberjaya, Malaysia
159 rdf:type schema:Organization
160 grid-institutes:grid.467609.a schema:alternateName Dept. of IT Security, UBS AG, Zürich, Switzerland
161 schema:name Dept. of IT Security, UBS AG, Zürich, Switzerland
162 rdf:type schema:Organization
163 grid-institutes:grid.480244.e schema:alternateName Nagravision SA, Kudelski Security, Cheseaux-sur-Lausanne, Switzerland
164 schema:name Nagravision SA, Kudelski Security, Cheseaux-sur-Lausanne, Switzerland
165 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...