TY - CHAP
T1 - Conclusion
AU - Aumasson, Jean Philippe
AU - Meier, Willi
AU - Phan, Raphael C.W.
AU - Henzen, Luca
N1 - Publisher Copyright:
© 2014, Springer-Verlag Berlin Heidelberg.
Copyright:
Copyright 2021 Elsevier B.V., All rights reserved.
PY - 2014
Y1 - 2014
N2 - It should be clear that, like all the other four SHA3 finalists, BLAKE and BLAKE2 are unlikely to be broken in a meaningful way—that is, in a way that allows an attacker to compromise the security of a system where they are used in a sound way. It is not excluded that one day someone will find, using sophisticated techniques, a “distinguisher” for the full permutation of BLAKE or of BLAKE2, but that would not affect its practical security.
AB - It should be clear that, like all the other four SHA3 finalists, BLAKE and BLAKE2 are unlikely to be broken in a meaningful way—that is, in a way that allows an attacker to compromise the security of a system where they are used in a sound way. It is not excluded that one day someone will find, using sophisticated techniques, a “distinguisher” for the full permutation of BLAKE or of BLAKE2, but that would not affect its practical security.
UR - http://www.scopus.com/inward/record.url?scp=85019685526&partnerID=8YFLogxK
U2 - 10.1007/978-3-662-44757-4_10
DO - 10.1007/978-3-662-44757-4_10
M3 - Chapter (Book)
AN - SCOPUS:85019685526
T3 - Information Security and Cryptography
SP - 185
BT - Information Security and Cryptography
PB - Springer
ER -