Conclusion

Jean Philippe Aumasson, Willi Meier, Raphael C.W. Phan, Luca Henzen

Research output: Chapter in Book/Report/Conference proceedingChapter (Book)Otherpeer-review

Abstract

It should be clear that, like all the other four SHA3 finalists, BLAKE and BLAKE2 are unlikely to be broken in a meaningful way—that is, in a way that allows an attacker to compromise the security of a system where they are used in a sound way. It is not excluded that one day someone will find, using sophisticated techniques, a “distinguisher” for the full permutation of BLAKE or of BLAKE2, but that would not affect its practical security.

Original languageEnglish
Title of host publicationInformation Security and Cryptography
PublisherSpringer
Pages185
Number of pages1
DOIs
Publication statusPublished - 2014
Externally publishedYes

Publication series

NameInformation Security and Cryptography
Volume24
ISSN (Print)1619-7100
ISSN (Electronic)2197-845X

Cite this