Analysis of BLAKE2

  title={Analysis of BLAKE2},
  author={Jian Guo and Pierre Karpman and Ivica Nikolic and Lei Wang and Shuang Wu},
  booktitle={IACR Cryptology ePrint Archive},
We present a thorough security analysis of the hash function family BLAKE2, a recently proposed and already in use tweaked version of the SHA-3 finalist BLAKE. We study how existing attacks on BLAKE apply to BLAKE2 and to what extent the modifications impact the attacks. We design and run two improved searches for (impossible) differential attacks — the outcomes suggest higher number of attacked rounds in the case of impossible differentials (in fact we improve the best results for BLAKE as… CONTINUE READING

From This Paper

Topics from this paper.


Publications citing this paper.
Showing 1-10 of 14 extracted citations

The Hash Function BLAKE

Information Security and Cryptography • 2014
View 5 Excerpts
Highly Influenced

Advances in Cryptology – EUROCRYPT 2016

Marc Fischlin Jean-Sébastien
Lecture Notes in Computer Science • 2016
View 2 Excerpts


Publications referenced by this paper.
Showing 1-10 of 16 references

Iterative differentials, symmetries, and message modification in BLAKE-256

Orr Dunkelman, Dmitry Khovratovich
In ECRYPT2 Hash Workshop, • 2011
View 8 Excerpts
Highly Influenced

Attacks on Round-Reduced BLAKE

IACR Cryptology ePrint Archive • 2009
View 2 Excerpts
Highly Influenced

Wilcox-O’Hearn, and Christian Winnerlein

Jean-Philippe Aumasson, Samuel Neves, Zooko
The BLAKE2 website, • 2013
View 1 Excerpt


G. Bertoni, J. Daemen, M. Peeters, G. Va
The Keccak reference, January • 2011
View 2 Excerpts

Similar Papers

Loading similar papers…