Are you over 18 and want to see adult content?
More Annotations
![A complete backup of trainstatus.info](https://www.archivebay.com/archive/7946cafb-8ea5-40db-b949-295e7fc0cfcb.png)
A complete backup of trainstatus.info
Are you over 18 and want to see adult content?
![A complete backup of nomemade-randomness.blogspot.com](https://www.archivebay.com/archive/9eef6ba2-4795-4eef-b04f-be1821773153.png)
A complete backup of nomemade-randomness.blogspot.com
Are you over 18 and want to see adult content?
![A complete backup of psjhmedgroups.org](https://www.archivebay.com/archive/47564de4-1459-4b15-98ac-3849a6a86e93.png)
A complete backup of psjhmedgroups.org
Are you over 18 and want to see adult content?
![A complete backup of a-broader-sensibility.tumblr.com](https://www.archivebay.com/archive/336eb10a-e0e0-4859-b701-aee91b32c3c6.png)
A complete backup of a-broader-sensibility.tumblr.com
Are you over 18 and want to see adult content?
![A complete backup of harianhaluan.com](https://www.archivebay.com/archive/97e0fdda-86ab-4acd-8969-4095311ba87f.png)
A complete backup of harianhaluan.com
Are you over 18 and want to see adult content?
![A complete backup of mysteriousfinds.tumblr.com](https://www.archivebay.com/archive/7e49f8b0-dfb0-48f7-9866-20aac875faf5.png)
A complete backup of mysteriousfinds.tumblr.com
Are you over 18 and want to see adult content?
![A complete backup of vitalia-reformhaus.de](https://www.archivebay.com/archive/39b23f52-6939-41fc-84f3-8472bdcf07d4.png)
A complete backup of vitalia-reformhaus.de
Are you over 18 and want to see adult content?
![A complete backup of portadores-de-la-noche.blogspot.com](https://www.archivebay.com/archive/77872ef1-7f79-4f6a-a475-bfa2f7ca46e7.png)
A complete backup of portadores-de-la-noche.blogspot.com
Are you over 18 and want to see adult content?
Favourite Annotations
![A complete backup of https://uniqlo.com](https://www.archivebay.com/archive6/images/0f78de4d-b47f-4569-bef8-b15ef150594d.png)
A complete backup of https://uniqlo.com
Are you over 18 and want to see adult content?
![A complete backup of https://uhamru.cz](https://www.archivebay.com/archive6/images/83db2cf8-fa0c-4535-8e48-c126fc536a8d.png)
A complete backup of https://uhamru.cz
Are you over 18 and want to see adult content?
![A complete backup of https://psdlearning.com](https://www.archivebay.com/archive6/images/f6076dfb-6390-4ace-94d2-31f0464d83e1.png)
A complete backup of https://psdlearning.com
Are you over 18 and want to see adult content?
![A complete backup of https://bulinfo.eu](https://www.archivebay.com/archive6/images/357fab44-e46e-4c34-832e-18e271e73412.png)
A complete backup of https://bulinfo.eu
Are you over 18 and want to see adult content?
![A complete backup of https://occourts.org](https://www.archivebay.com/archive6/images/1e5cbd2e-27e0-4472-a06b-6a88199e7cfa.png)
A complete backup of https://occourts.org
Are you over 18 and want to see adult content?
![A complete backup of https://palatesensations.com](https://www.archivebay.com/archive6/images/c8a2d9ba-0d6d-43e2-98d0-9f9842ec9d79.png)
A complete backup of https://palatesensations.com
Are you over 18 and want to see adult content?
![A complete backup of https://wetsuitwearhouse.com](https://www.archivebay.com/archive6/images/e5351566-577d-454d-9a67-5dddcf81efbc.png)
A complete backup of https://wetsuitwearhouse.com
Are you over 18 and want to see adult content?
![A complete backup of https://upgradehotelaria.com](https://www.archivebay.com/archive6/images/b5ff8a0e-8cf9-4c1c-9ef6-2eccd71a8f51.png)
A complete backup of https://upgradehotelaria.com
Are you over 18 and want to see adult content?
![A complete backup of https://onlinestoreforu.co](https://www.archivebay.com/archive6/images/4bef0734-e1fa-4ca0-a84e-c79b24c662b8.png)
A complete backup of https://onlinestoreforu.co
Are you over 18 and want to see adult content?
![A complete backup of https://deichtorhallen.de](https://www.archivebay.com/archive6/images/b2b8eafd-058e-415e-a235-690129ac7081.png)
A complete backup of https://deichtorhallen.de
Are you over 18 and want to see adult content?
![A complete backup of https://bookmakers-mob-ci.com](https://www.archivebay.com/archive6/images/026f4047-398e-44ff-baaf-7a7c5481cc6f.png)
A complete backup of https://bookmakers-mob-ci.com
Are you over 18 and want to see adult content?
![A complete backup of https://alorestaurant.com](https://www.archivebay.com/archive6/images/99a49352-b590-4f68-895b-584388411e0d.png)
A complete backup of https://alorestaurant.com
Are you over 18 and want to see adult content?
Text
BLAKE2
BLAKE2 — fast secure hashing SPECS | CODE | B2SUM | CONTACT | USERS | THIRD-PARTY SOFTWARE | CRYPTANALYSIS | FAQ CONSIDER USING BLAKE3, faster than BLAKE2, see BLAKE2: SIMPLER, SMALLER, FAST AS MD5 0 5 10 15 20 25 BLAKE2b BLAKE2s MD5 SHA-1 SHA-256 SHA-512 SHA3-256 SHA3-512 cycles per byte speed on Intel Sandy Bridge mebibytes persecond at 3.1GHz
BLAKE2X
References Kevin Atighehchi and Alexis Bonnecaze. Asymptotic analysis of plausible tree hash modes for SHA-3. Cryptology ePrint Archive, Report 2016/658, 2016. HASH-FLOODING DOS RELOADED: ATTACKS AND DEFENSES True on legacy hardware, but recent SSDs R/W at ≈500MBps on 2GHz Core i7 (SB) SHA-256: 110 MiBps SHA-512: 172 MiBps “OK, but softwarehashing
BLAKE2 — AN ALTERNATIVE TO MD5/SHA-1 What are MD5/SHA-1 used for? Distributed filesystems, cloud storage, data deduplication, peer-to-peer file-sharing, revision control systems, host-based intrusion detection systems, digital forensics, distributed databases, BLAKE2: SIMPLER, SMALLER, FAST AS MD5 BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1, Samuel Neves2, Zooko Wilcox-O’Hearn3, and Christian Winnerlein4 1 Kudelski Security, Switzerland jeanphilippe.aumasson@gmail.com 2 University of Coimbra, Portugal sneves@dei.uc.pt 3 Least Authority Enterprises, USAzooko@zooko.com
BLAKE2
BLAKE2 — fast secure hashing SPECS | CODE | B2SUM | CONTACT | USERS | THIRD-PARTY SOFTWARE | CRYPTANALYSIS | FAQ CONSIDER USING BLAKE3, faster than BLAKE2, see BLAKE2: SIMPLER, SMALLER, FAST AS MD5 0 5 10 15 20 25 BLAKE2b BLAKE2s MD5 SHA-1 SHA-256 SHA-512 SHA3-256 SHA3-512 cycles per byte speed on Intel Sandy Bridge mebibytes persecond at 3.1GHz
BLAKE2X
References Kevin Atighehchi and Alexis Bonnecaze. Asymptotic analysis of plausible tree hash modes for SHA-3. Cryptology ePrint Archive, Report 2016/658, 2016. HASH-FLOODING DOS RELOADED: ATTACKS AND DEFENSES True on legacy hardware, but recent SSDs R/W at ≈500MBps on 2GHz Core i7 (SB) SHA-256: 110 MiBps SHA-512: 172 MiBps “OK, but softwarehashing
BLAKE2 — AN ALTERNATIVE TO MD5/SHA-1 What are MD5/SHA-1 used for? Distributed filesystems, cloud storage, data deduplication, peer-to-peer file-sharing, revision control systems, host-based intrusion detection systems, digital forensics, distributed databases, BLAKE2: SIMPLER, SMALLER, FAST AS MD5 BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1, Samuel Neves2, Zooko Wilcox-O’Hearn3, and Christian Winnerlein4 1 Kudelski Security, Switzerland jeanphilippe.aumasson@gmail.com 2 University of Coimbra, Portugal sneves@dei.uc.pt 3 Least Authority Enterprises, USAzooko@zooko.com
BLAKE2
BLAKE2 — fast secure hashing SPECS | CODE | B2SUM | CONTACT | USERS | THIRD-PARTY SOFTWARE | CRYPTANALYSIS | FAQ CONSIDER USING BLAKE3, faster than BLAKE2, see BLAKE2: SIMPLER, SMALLER, FAST AS MD5 0 5 10 15 20 25 BLAKE2b BLAKE2s MD5 SHA-1 SHA-256 SHA-512 SHA3-256 SHA3-512 cycles per byte speed on Intel Sandy Bridge mebibytes persecond at 3.1GHz
BLAKE2X
References Kevin Atighehchi and Alexis Bonnecaze. Asymptotic analysis of plausible tree hash modes for SHA-3. Cryptology ePrint Archive, Report 2016/658, 2016. HASH-FLOODING DOS RELOADED: ATTACKS AND DEFENSES True on legacy hardware, but recent SSDs R/W at ≈500MBps on 2GHz Core i7 (SB) SHA-256: 110 MiBps SHA-512: 172 MiBps “OK, but softwarehashing
BLAKE2 — AN ALTERNATIVE TO MD5/SHA-1 What are MD5/SHA-1 used for? Distributed filesystems, cloud storage, data deduplication, peer-to-peer file-sharing, revision control systems, host-based intrusion detection systems, digital forensics, distributed databases, BLAKE2: SIMPLER, SMALLER, FAST AS MD5 BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1, Samuel Neves2, Zooko Wilcox-O’Hearn3, and Christian Winnerlein4 1 Kudelski Security, Switzerland jeanphilippe.aumasson@gmail.com 2 University of Coimbra, Portugal sneves@dei.uc.pt 3 Least Authority Enterprises, USAzooko@zooko.com
BLAKE2
BLAKE2 — fast secure hashing SPECS | CODE | B2SUM | CONTACT | USERS | THIRD-PARTY SOFTWARE | CRYPTANALYSIS | FAQ CONSIDER USING BLAKE3, faster than BLAKE2, see BLAKE2: SIMPLER, SMALLER, FAST AS MD5 0 5 10 15 20 25 BLAKE2b BLAKE2s MD5 SHA-1 SHA-256 SHA-512 SHA3-256 SHA3-512 cycles per byte speed on Intel Sandy Bridge mebibytes persecond at 3.1GHz
BLAKE2X
References Kevin Atighehchi and Alexis Bonnecaze. Asymptotic analysis of plausible tree hash modes for SHA-3. Cryptology ePrint Archive, Report 2016/658, 2016. HASH-FLOODING DOS RELOADED: ATTACKS AND DEFENSES True on legacy hardware, but recent SSDs R/W at ≈500MBps on 2GHz Core i7 (SB) SHA-256: 110 MiBps SHA-512: 172 MiBps “OK, but softwarehashing
BLAKE2 — AN ALTERNATIVE TO MD5/SHA-1 What are MD5/SHA-1 used for? Distributed filesystems, cloud storage, data deduplication, peer-to-peer file-sharing, revision control systems, host-based intrusion detection systems, digital forensics, distributed databases, BLAKE2: SIMPLER, SMALLER, FAST AS MD5 BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1, Samuel Neves2, Zooko Wilcox-O’Hearn3, and Christian Winnerlein4 1 Kudelski Security, Switzerland jeanphilippe.aumasson@gmail.com 2 University of Coimbra, Portugal sneves@dei.uc.pt 3 Least Authority Enterprises, USAzooko@zooko.com
BLAKE2
BLAKE2 — fast secure hashing SPECS | CODE | B2SUM | CONTACT | USERS | THIRD-PARTY SOFTWARE | CRYPTANALYSIS | FAQ CONSIDER USING BLAKE3, faster than BLAKE2, see BLAKE2: SIMPLER, SMALLER, FAST AS MD5 0 5 10 15 20 25 BLAKE2b BLAKE2s MD5 SHA-1 SHA-256 SHA-512 SHA3-256 SHA3-512 cycles per byte speed on Intel Sandy Bridge mebibytes persecond at 3.1GHz
BLAKE2X
References Kevin Atighehchi and Alexis Bonnecaze. Asymptotic analysis of plausible tree hash modes for SHA-3. Cryptology ePrint Archive, Report 2016/658, 2016. HASH-FLOODING DOS RELOADED: ATTACKS AND DEFENSES True on legacy hardware, but recent SSDs R/W at ≈500MBps on 2GHz Core i7 (SB) SHA-256: 110 MiBps SHA-512: 172 MiBps “OK, but softwarehashing
BLAKE2 — AN ALTERNATIVE TO MD5/SHA-1 What are MD5/SHA-1 used for? Distributed filesystems, cloud storage, data deduplication, peer-to-peer file-sharing, revision control systems, host-based intrusion detection systems, digital forensics, distributed databases, BLAKE2: SIMPLER, SMALLER, FAST AS MD5 BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1, Samuel Neves2, Zooko Wilcox-O’Hearn3, and Christian Winnerlein4 1 Kudelski Security, Switzerland jeanphilippe.aumasson@gmail.com 2 University of Coimbra, Portugal sneves@dei.uc.pt 3 Least Authority Enterprises, USAzooko@zooko.com
BLAKE2
BLAKE2 — fast secure hashing SPECS | CODE | B2SUM | CONTACT | USERS | THIRD-PARTY SOFTWARE | CRYPTANALYSIS | FAQ CONSIDER USING BLAKE3, faster than BLAKE2, see BLAKE2: SIMPLER, SMALLER, FAST AS MD5 0 5 10 15 20 25 BLAKE2b BLAKE2s MD5 SHA-1 SHA-256 SHA-512 SHA3-256 SHA3-512 cycles per byte speed on Intel Sandy Bridge mebibytes persecond at 3.1GHz
BLAKE2X
References Kevin Atighehchi and Alexis Bonnecaze. Asymptotic analysis of plausible tree hash modes for SHA-3. Cryptology ePrint Archive, Report 2016/658, 2016. HASH-FLOODING DOS RELOADED: ATTACKS AND DEFENSES True on legacy hardware, but recent SSDs R/W at ≈500MBps on 2GHz Core i7 (SB) SHA-256: 110 MiBps SHA-512: 172 MiBps “OK, but softwarehashing
BLAKE2 — AN ALTERNATIVE TO MD5/SHA-1 What are MD5/SHA-1 used for? Distributed filesystems, cloud storage, data deduplication, peer-to-peer file-sharing, revision control systems, host-based intrusion detection systems, digital forensics, distributed databases, BLAKE2: SIMPLER, SMALLER, FAST AS MD5 BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1, Samuel Neves2, Zooko Wilcox-O’Hearn3, and Christian Winnerlein4 1 Kudelski Security, Switzerland jeanphilippe.aumasson@gmail.com 2 University of Coimbra, Portugal sneves@dei.uc.pt 3 Least Authority Enterprises, USAzooko@zooko.com
BLAKE2
BLAKE2 — fast secure hashing SPECS | CODE | B2SUM | CONTACT | USERS | THIRD-PARTY SOFTWARE | CRYPTANALYSIS | FAQ CONSIDER USING BLAKE3, faster than BLAKE2, see BLAKE2: SIMPLER, SMALLER, FAST AS MD5 0 5 10 15 20 25 BLAKE2b BLAKE2s MD5 SHA-1 SHA-256 SHA-512 SHA3-256 SHA3-512 cycles per byte speed on Intel Sandy Bridge mebibytes persecond at 3.1GHz
BLAKE2X
References Kevin Atighehchi and Alexis Bonnecaze. Asymptotic analysis of plausible tree hash modes for SHA-3. Cryptology ePrint Archive, Report 2016/658, 2016. HASH-FLOODING DOS RELOADED: ATTACKS AND DEFENSES True on legacy hardware, but recent SSDs R/W at ≈500MBps on 2GHz Core i7 (SB) SHA-256: 110 MiBps SHA-512: 172 MiBps “OK, but softwarehashing
BLAKE2 — AN ALTERNATIVE TO MD5/SHA-1 What are MD5/SHA-1 used for? Distributed filesystems, cloud storage, data deduplication, peer-to-peer file-sharing, revision control systems, host-based intrusion detection systems, digital forensics, distributed databases, BLAKE2: SIMPLER, SMALLER, FAST AS MD5 BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1, Samuel Neves2, Zooko Wilcox-O’Hearn3, and Christian Winnerlein4 1 Kudelski Security, Switzerland jeanphilippe.aumasson@gmail.com 2 University of Coimbra, Portugal sneves@dei.uc.pt 3 Least Authority Enterprises, USAzooko@zooko.com
BLAKE2
BLAKE2 — fast secure hashing SPECS | CODE | B2SUM | CONTACT | USERS | THIRD-PARTY SOFTWARE | CRYPTANALYSIS | FAQ CONSIDER USING BLAKE3, faster than BLAKE2, see BLAKE2: SIMPLER, SMALLER, FAST AS MD5 0 5 10 15 20 25 BLAKE2b BLAKE2s MD5 SHA-1 SHA-256 SHA-512 SHA3-256 SHA3-512 cycles per byte speed on Intel Sandy Bridge mebibytes persecond at 3.1GHz
BLAKE2X
References Kevin Atighehchi and Alexis Bonnecaze. Asymptotic analysis of plausible tree hash modes for SHA-3. Cryptology ePrint Archive, Report 2016/658, 2016. HASH-FLOODING DOS RELOADED: ATTACKS AND DEFENSES True on legacy hardware, but recent SSDs R/W at ≈500MBps on 2GHz Core i7 (SB) SHA-256: 110 MiBps SHA-512: 172 MiBps “OK, but softwarehashing
BLAKE2 — AN ALTERNATIVE TO MD5/SHA-1 What are MD5/SHA-1 used for? Distributed filesystems, cloud storage, data deduplication, peer-to-peer file-sharing, revision control systems, host-based intrusion detection systems, digital forensics, distributed databases, BLAKE2: SIMPLER, SMALLER, FAST AS MD5 BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1, Samuel Neves2, Zooko Wilcox-O’Hearn3, and Christian Winnerlein4 1 Kudelski Security, Switzerland jeanphilippe.aumasson@gmail.com 2 University of Coimbra, Portugal sneves@dei.uc.pt 3 Least Authority Enterprises, USAzooko@zooko.com
BLAKE2
BLAKE2 — fast secure hashing SPECS | CODE | B2SUM | CONTACT | USERS | THIRD-PARTY SOFTWARE | CRYPTANALYSIS | FAQ CONSIDER USING BLAKE3, faster than BLAKE2, see BLAKE2: SIMPLER, SMALLER, FAST AS MD5 0 5 10 15 20 25 BLAKE2b BLAKE2s MD5 SHA-1 SHA-256 SHA-512 SHA3-256 SHA3-512 cycles per byte speed on Intel Sandy Bridge mebibytes persecond at 3.1GHz
BLAKE2X
References Kevin Atighehchi and Alexis Bonnecaze. Asymptotic analysis of plausible tree hash modes for SHA-3. Cryptology ePrint Archive, Report 2016/658, 2016. HASH-FLOODING DOS RELOADED: ATTACKS AND DEFENSES True on legacy hardware, but recent SSDs R/W at ≈500MBps on 2GHz Core i7 (SB) SHA-256: 110 MiBps SHA-512: 172 MiBps “OK, but softwarehashing
BLAKE2 — AN ALTERNATIVE TO MD5/SHA-1 What are MD5/SHA-1 used for? Distributed filesystems, cloud storage, data deduplication, peer-to-peer file-sharing, revision control systems, host-based intrusion detection systems, digital forensics, distributed databases, BLAKE2: SIMPLER, SMALLER, FAST AS MD5 BLAKE2: simpler, smaller, fast as MD5 Jean-Philippe Aumasson1, Samuel Neves2, Zooko Wilcox-O’Hearn3, and Christian Winnerlein4 1 Kudelski Security, Switzerland jeanphilippe.aumasson@gmail.com 2 University of Coimbra, Portugal sneves@dei.uc.pt 3 Least Authority Enterprises, USAzooko@zooko.com
BLAKE2 — FAST SECURE HASHING SPECS | CODE | B2SUM | CONTACT | USERS | THIRD-PARTY SOFTWARE | CRYPTANALYSIS| FAQ
BLAKE2 is a cryptographic hash function FASTER THAN MD5, SHA-1, SHA-2, AND SHA-3, yet is at least as secure as the latest standard SHA-3. BLAKE2 has been adopted by many projects due to its high speed, security, and simplicity. BLAKE2 is specified in RFC 7693 , and our code and test vectors are available on GitHub , licensed under CC0 (public domain-like). BLAKE2 is also described in the 2015 book The Hash Function BLAKE.
BLAKE2 comes in two flavors: * BLAKE2B (or just BLAKE2) is optimized for 64-bit platforms—including NEON-enabled ARMs—and produces digests of any size between 1 and 64 bytes BLAKE2S is optimized for 8- TO 32-BIT platforms and produces digests of any size between 1 and 32 bytes BLAKE2 includes the 4-way parallel BLAKE2BP and 8-way parallel BLAKE2SP designed for increased performance on multicore or SIMD CPUs. BLAKE2 offers these algorithms tuned to your specific requirements, such as KEYED hashing (that is, MAC or PRF), hashing with a SALT, updatable or incremental TREE-HASHING, or any combination thereof. These versions are specified in the BLAKE2 document . BLAKE2 also includes the BLAKE2X variants, which can produce digests of arbitrary length. BLAKE2x is specified in a separate document.
BLAKE2 shines on 64-bit CPUs: on an Intel Core i5-6600 (Skylake microarchitecture, 3310MHz), BLAKE2b can process 1 GIBIBYTE PER SECOND, or a speed rate of 3.08 cycles per byte. The plot below shows how BLAKE2 outperforms MD5, SHA-1, SHA-2, and SHA-3 on a Skylake Intel CPU (speeds are for hashing using a single core; using multiple cores, BLAKE2 can be even faster):SPECIFICATIONS
* blake2.pdf is our original BLAKE2 documentation, which describes how we went from the SHA-3 finalist BLAKE to BLAKE2, how all the BLAKE2 versions work, and analyzes BLAKE2's performanceand security.
* RFC 7693 is an RFC edited by Markku-Juhani O. Saarinen that provides a complete specification ofBLAKE2b and BLAKE2s
* blake2x.pdf , the specification of BLAKE2X, versions of BLAKE2 to create hashes of any length up to 4 GiB and build XOFs, KDFs, and DRBGs (published to request comments, design not final yet)B2SUM
The b2sum utility is similar to the md5sum or shasum utilities but for BLAKE2. The archive b2sum-bin_20130305.zip provides fat binaries of b2sum for Linux and Windows, 32-bit and 64-bit.CONTACT
BLAKE2 was designed by a team of experts in cryptanalysis, implementation, and cryptographic engineering: * Jean-Philippe Aumasson (@veorq , https://131002.net): main designer of BLAKE, author of research paperson cryptanalysis
* Samuel Neves (@sevenps , http://eden.dei.uc.pt/~sneves/): author of the fastest BLAKE implementations, and of research papers on efficient implementations * Zooko Wilcox-O'Hearn (@zooko , https://LeastAuthority.com): one of the designers of the Tahoe-LAFS secure distributed storage system * Christian Winnerlein (@codesinchaos,
https://codesinchaos.wordpress.com/ ): author of a number of C#projects
BLAKE2 is based on the SHA-3 proposal BLAKE , designed by Jean-Philippe Aumasson, Luca Henzen, Willi Meier, and Raphael C.-W. Phan. BLAKE2, like BLAKE, relies on a core algorithm borrowed from the ChaCha stream cipher, designed by Daniel J. Bernstein. You may contact us on Twitter if 140 characters are enough and if a public discussion is okay. Otherwise, please email us to contact@blake2.net, which forwards to the four designers. We created a mailing list for BLAKE2 discussions (security, performance, bug reports, etc.): to subscribe, please send an empty message to info-subscribe@blake2.net.USERS
Non-exhaustive list of systems using BLAKE2: * WolfSSL : WolfSSL includes BLAKE2b * OpenSSL : OpenSSL includes BLAKE2b andBLAKE2s
* Wireguard : The Wireguard VPN uses BLAKE2s for hashing and as a MAC * Botan : The Botan library includesBLAKE2b
* Crypto++ : The Crypto++ library includes BLAKE2s and BLAKE2b * Noise : The Noise protocol (now used in WhatsApp) uses BLAKE2s and BLAKE2b * Cifra Extrema : Cifra Extrema products use several versions of BLAKE2 in its servers and satellitemodules
* Bouncy Castle :
Includes BLAKE2b-160, BLAKE2b-256, BLAKE2b-384, and BLAKE2b-512 * Peerio : BLAKE2s is used to generated IDs and for integrity checks * 8th : BLAKE2s is the default hash in the 8th cross-platform development system * librsync : BLAKE2b is the default hash un this popular remote delta-compression library * checksum : BLAKE2s is one of the three hash functions supported with MD5 and SHA-1 * Password hashing schemes: * Argon2 (by Biryukov, Dinu, Khovratovich; PHC winner) * Catena (by Forler, Lucks, Wenzel; PHC candidate) * Lanarea (by Mubarak; PHCcandidate)
* Lyra and Lyra2 (by Simplicio Jr., Barreto, Almeida, Andrade; PHC candidate)* Neoscrypt (by
Doering)
* RIG (by Chang, Jati, Mishra, Sanadhya; PHC candidate) * TwoCats (by Cox; PHC candidate) * Yarn (by Capun; PHC candidate) * Crypto tools by catid : * Cymric ("portable secure randomnumber generator")
* Snowshoe ("portable, secure, fast elliptic curve math library") * Tabby ("strong, fast, and portable cryptographic signatures and handshakes") * Sodium : BLAKE2b is the default hash function of this cryptography library based on NaCl * Accumulus : BLAKE2s is used for producing unique keys of the data stored * Archivarius 3000 : BLAKE2s is used for deduplication in this desktop search system * Phoronix Test Suite : BLAKE2s is one of the benchmark modules (see OpenBenchmarking)
* WinRAR : BLAKE2sp
is an optional checksum in the RAR 5.0 archive format * YACP : BLAKE2 is integrated in Yet Another Cygwin-Ports * CyaSSL : BLAKE2b is one of the hash functions supported in this lightweight SSL library * Insomni'hack 2013 : BLAKE2b was the hash used to validate flags in this hacking contest (CTF) * Pcompress : BLAKE2b is the default checksum in this parallel compression and deduplication utility; BLAKE2bp is used in some cases THIRD-PARTY SOFTWARE * 2018 Jun 13: Nazar Mokrynskyi. _blake2.wasm_.
Main result: WebAssembly version * 2018 Jun 4: Jack O'Connor. _blake2_c.rs_.
Main result: safe Rust wrapper around the C implementation * 2016 Sep 25: dcposch. _blakejs_.
Main result: pure JavaScript implementation of BLAKE2b and BLAKE2s * 2016 Aug 25: Minio Cloud Storage. _blake2b-simd_.
Main result: fast hashing using pure Go implementation of BLAKE2b withSIMD instructions
* 2016 Jan 31: Pol Le Garsmeur. _java-blake2s_.
Main result: Java implementation of BLAKE2s * 2016 Jan 5: ScorexProject. _scrypto_.
Main result: Scala library providing BLAKE2 * 2015 Dec 5: John Galt. _blake2_.
Main result: Haskell library providing BLAKE2 * 2015 Nov 9: Cesar Eduardo Barros. _blake2-rfc_.
Main result: pure Rust, with experimental SIMD support * 2015 Oct 31: Coda Hale. _blake2_.
Main result: Go wrapper * 2015 Jun 9: Ivan Kozik. _node-blake2_.
Main result: io.js bindings for BLAKE2b, BLAKE2s, BLAKE2bp, BLAKE2sp * 2015 Jan 30: Markku-Juhani O. Saarinen. _blake2_mjosref_.
Main result: "A clean & simple implementation of BLAKE2b and BLAKE2s hash functions -- written while writing the RFC." * 2014 Aug 27: Michael Gehring. _rust-blake2_.
Main result: Rust implementation of BLAKE2b and BLAKE2s * 2014 Aug 4: C. J. Silvero. _avon_.
Main result: node bindings for BLAKE2b, BLAKE2s, BLAKE2bp, andBLAKE2Sp
* 2014 Feb 14: Joubin Houshyar. _Blake2b_.
Main result: Java implementation of BLAKE2b * 2013 Dec 16: Larry Bugbee. _blake2_py_.
Main result: 100% Python implementation of BLAKE2b and BLAKE2s * 2013 May 10: Floodyberry. _blake2b-opt_.
Main result: optimized C implementation of BLAKE2b for x86, SSE2,SSSE3, AVX, and XOP
* 2013 Mar 27: Dmitry Chestnykh. _pyblake2_.
Main result: Python module for BLAKE2b and BLAKE2s * 2013 February 9: Tasuku Suenaga. _Digest-BLAKE2-0.01_.
Main result: Perl interface to BLAKE2 * 2013 Feb 3: Dmitry Chestnykh. _blake2-dart_.
Main result: Dart implementation of BLAKE2s * 2013 Jan 14: Corey Richardson. _libblake2_.
Main result: shared and static libraries for BLAKE2b, BLAKE2s, BLAKE2bp, and BLAKE2sp * 2013 Jan 7: Ulrik Sverdrup. _blake2-ppc-altivec_.
Main result: BLAKE2s for PowerPC Altivec * 2013 Jan 6: Takashi Seki. _node-blake2_.
Main result: node bindings for BLAKE2b, BLAKE2s, BLAKE2bp, andBLAKE2Sp
* 2013 Jan 3: Dmitry Chestnykh. _b2sum in Go_.
Main result: b2sum binaries for OS X (amd64), Linux (amd64), andWindows (x86)
* 2012 Dec 30: Kwon-Han Bae. _python-blake2_.
Main result: Python module for BLAKE2b and BLAKE2s * 2012 Dec 29: Dmitry Chestnykh. _blake2s-js_.
Main result: BLAKE2s in TypeScript/JavaScript * 2012 Dec 29: Dmitry Chestnykh. _blake2s_.
Main result: BLAKE2s in Go * 2012 Dec 24: Craig Akimoto. _php-blake2_.
Main result: PHP wrapper * 2012 Dec 22: Dmitry Chestnykh. _b2sum_.
Main result: command line tool b2sum in Go * 2012 Dec 22: Dmitry Chestnykh. _blake2b_.
Main result: BLAKE2b in GoCRYPTANALYSIS
* 2015 May 28: Thomas Espitau, Pierre-Alain Fouque, Pierre Karpman. Higher-Order Differential Meet-in-The-Middle Preimage Attacks on SHA-1 and BLAKE . IACR ePrint archive,report 2015/515.
* 2015 Feb 9: Dmitry Khovratovich, Ivica Nikolic, Josef Pieprzyk, Przemyslaw Sokolowski, Ron Steinfeld. Rotational Cryptanalysis of ARX Revisited . IACR ePrint archive,report 2015/095.
* 2014 Dec 18: Yonglin Hao. The Boomerang Attacks on BLAKE and BLAKE2 . IACR ePrint archive, report2014/1012.
* 2013 Jul 29: Jian Guo, Pierre Karpman, Ivica Nikolic, Lei Wang, Shuang Wu. Analysis of BLAKE2 . IACR ePrint archive, report 2013/467.FAQ
Q: WHERE ARE TEST VECTORS? A: https://github.com/BLAKE2/BLAKE2/tree/master/testvectors Q: HOW CAN I BE SURE THE BLAKE2 IS SECURE? A: We have no proof that BLAKE2 is as secure as we claim, but there are good reasons to believe it: BLAKE2 relies on (essentially) the same core algorithm as BLAKE, which has been intensively analyzed since 2008 within the SHA-3 competition, and which was one of the 5 finalists. NIST's final reportwrites
that BLAKE has a "very large security margin", and that the the cryptanalysis performed on it has "a great deal of depth". The best academic attack on BLAKE (and BLAKE2) works on a reduced version with 2.5 rounds, whereas BLAKE2b does 12 rounds, and BLAKE2s does 10 rounds. But even this attack is not practical: it only shows for example that with 2.5 rounds, the preimage security of BLAKE2b is downgraded from 512 bits to 481 bits, or that the collision security of BLAKE2s is downgraded from 128 bits to 112 bits (which is similar to the security of 2048-bit RSA). Q: WHY IS BLAKE2 SO FAST? A: BLAKE2 is fast in software because it exploits features of modern CPUs, namely instruction-level parallelism, SIMD instruction set extensions, and multiple cores. BLAKE2 also benefits from the optimization work performed during the SHA-3 competition (see for example this paper by two of the designers of BLAKE2). Q: WHY DO YOU WANT BLAKE2 TO BE FAST? AREN'T FAST HASHES BAD? A: You want your hash function to be fast if you are using it to compute the secure hash of a large amount of data, such as in distributed filesystems (e.g. Tahoe-LAFS), cloud storage systems (e.g. OpenStack Swift), intrusion detection systems (e.g. Samhain), integrity-checking local filesystems (e.g. ZFS), peer-to-peer file-sharing tools (e.g. BitTorrent), or version control systems (e.g. git). You only want your hash function to be slow if you're using it to "stretch" user-supplied passwords, in which case see the nextquestion.
Q: SO I SHOULDN'T USE BLAKE2 FOR HASHING USER PASSWORDS? A: You shouldn't use *any* general-purpose hash function for user passwords, not BLAKE2, and not MD5, SHA-1, SHA-256, or SHA-3. Instead you should use a password hashing function such as the PHCwinner Argon2
with appropriate time and memory cost parameters, to mitigate the risk of bruteforce attacks—Argon2's core uses a variant of BLAKE2's permutation. Q: BLAKE2BP GIVES DIFFERENT RESULTS FROM BLAKE2B. IS THAT NORMAL? A: Yes. BLAKE2bp is a different algorithm from BLAKE2b and BLAKE2sp is a different algorithm from BLAKE2s. Each algorithm produces a different hash value. BLAKE2b and BLAKE2s are designed to be efficient on a single CPU core (BLAKE2b is more efficient on 64-bit CPUs and BLAKE2s is more efficient on 8-bit, 16-bit, or 32-bit CPUs). BLAKE2bp and BLAKE2sp are designed to be efficient on multicore or SIMD chips, by processing the input in parallel. This parallel approach results in different secure hash values from the single-core variants. More generally, two instances of BLAKE2b or BLAKE2s with two distinct sets of parameters will produce different results. For example, BLAKE2b in some tree mode (say, with fanout 2) will produce different results than BLAKE2b in a modified tree mode (say, with fanout 3). Q: WHICH SHOULD I USE? BLAKE2B, BLAKE2S, BLAKE2BP, OR BLAKE2SP? A: A rule of thumb is that on 64-bit platforms the best choice is BLAKE2b, whereas on 32-bit (or smaller) platforms BLAKE2s is recommended. Or, you could try each of the four of them and see which one performs best on your deployment platform. If you do that, please write to us and let us know what you found. Q: THE BLAKE2 DOCUMENTATION ONLY DESCRIBES DIFFERENCES WITH THE ORIGINAL BLAKE, WHERE CAN I FIND A COMPLETE SPECIFICATION? A: The RFC includes a complete specification of BLAKE2b and BLAKE2s (though not of the tree mode). ------------------------- _Modified: 2017-02-22_Details
Copyright © 2024 ArchiveBay.com. All rights reserved. Terms of Use | Privacy Policy | DMCA | 2021 | Feedback | Advertising | RSS 2.0