Browse Prior Art Database

The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC) (RFC7693)

IP.com Disclosure Number: IPCOM000245045D
Original Publication Date: 2015-Nov-01
Included in the Prior Art Database: 2016-Feb-06
Document File: 60 page(s) / 56K

Publishing Venue

Internet Society Requests For Comment (RFCs)

Related People

M-J. Saarinen: AUTHOR [+3]

Abstract

Saarinen & Aumasson Informational [Page 2]

RFC 7693 BLAKE2 Crypto Hash and MAC November 2015

This text was extracted from an ASCII text file.
This is the abbreviated version, containing approximately 5% of the total text.

Independent Submission                                M-J. Saarinen, Ed. Request for Comments: 7693                    Queen's University Belfast Category: Informational                                    J-P. Aumasson ISSN: 2070-1721                                        Kudelski Security                                                            November 2015

   The BLAKE2 Cryptographic Hash and Message Authentication Code (MAC)

Abstract

   This document describes the cryptographic hash function BLAKE2 and    makes the algorithm specification and C source code conveniently    available to the Internet community.  BLAKE2 comes in two main    flavors: BLAKE2b is optimized for 64-bit platforms and BLAKE2s for    smaller architectures.  BLAKE2 can be directly keyed, making it    functionally equivalent to a Message Authentication Code (MAC).

Status of This Memo

   This document is not an Internet Standards Track specification; it is    published for informational purposes.

   This is a contribution to the RFC Series, independently of any other    RFC stream.  The RFC Editor has chosen to publish this document at    its discretion and makes no statement about its value for    implementation or deployment.  Documents approved for publication by    the RFC Editor are not a candidate for any level of Internet    Standard; see Section 2 of RFC 5741.

   Information about the current status of this document, any errata,    and how to provide feedback on it may be obtained at    http://www.rfc-editor.org/info/rfc7693.

Copyright Notice

   Copyright (c) 2015 IETF Trust and the persons identified as the    document authors.  All rights reserved.

   This document is subject to BCP 78 and the IETF Trust's Legal    Provisions Relating to IETF Documents    (http://trustee.ietf.org/license-info) in effect on the date of    publication of this document.  Please review these documents    carefully, as they describe your rights and restrictions with respect    to this document.

 Saarinen & Aumasson           Informational                     [Page 1]
 RFC 7693               BLAKE2 Crypto Hash and MAC          November 2015

 Table of Contents

   1.  Introduction and Terminology  . . . . . . . . . . . . . . . .   3

   2.  Conventions, Variables, and Constants . . . . . . . . . . . .   4

     2.1.  Parameters  . . . . . . . . . . . . . . . . . . . . . . .   4

     2.2.  Other Constants and Variables . . . . . . . . . . . . . .   4

     2.3.  Arithmetic Notation . . . . . . . . . . . . . . . . . . .   4

     2.4.  Little-Endian Interpretation of Words as Bytes  . . . . .   5

     2.5.  Parameter Block . . . . ....