Abstract
Hashing is so crucial for integrity. Indeed, in order to respond to new technologies requirements, hash functions have always been subject to evolution and optimization. In the same context, NIST organized a competition in 2012 for a Sha-3 hashing function. BLAKE and KECCAK were two interesting functions in terms of speed and security. Keccak was the winner of the competition. It is different from the antecedent of SHA family because it combines the sponge construction to the Keccak-f-permutations. Therefore, it is optimized for security and hardware use. The Blake function is based on the same principle of the Sha-2, and it also presents many advantages of security and speed. The Blake was improvised for the BLAKE2, which is more optimized, faster, and more efficient. In this paper, we present the Keccak and the BLAKE2 algorithms; then, we will compare the performance parameters of the functions: Blake-256, Blake-512, Keccak-256, Keccak-512, Blake2b, and Blake2s.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Dat, T.N., Iwai, K., Matsubara, T., Kurokawa, T.: Implementation of high-speed hash function Keccak on GPU. IJNC 9(2), 370–389 (2019)
Kavun, E.B., Yalcin, T.:  A lightweight implementation of Keccak hash function for radio-frequency identification applications. In: Ors Yalcin, S.B. (ed.) Radio frequency identification: Security and privacy issues, vol. 6370, pp. 258–269. Springer, Berlin Heidelberg (2010)
Ramos-Calderer, S., Bellini, E., Latorre, J.I., Manzano, M., Mateu, V.: Quantum search for scaled hash function preimages. , arXiv:2009.00621[quant-ph], September 2020, Consulté le: Décember 28, 2020
Sugier,J.: Implementation efficiency of BLAKE2 cryptographic algorithm in contemporary popular-grade FPGA devices. In: Kabashkin, I., Yatskiv, I., Prentkovskis, O. (eds.) Reliability and statistics in transportation and communication, vol. 36, pp. 456–465. Springer International Publishing, Cham (2018)
Rao, V., Prema, K.V.: Comparative study of lightweight hashing functions for resource constrained devices of IoT. In 2019 4th International Conference on Computational Systems and Information Technology for Sustainable Solution (CSITSS), Bengaluru, India, pp. 1–5 (2019)
Aumasson, J.-P., Neves, S., Wilcox-O’Hearn, Z., Winnerlein, C.: BLAKE2: simpler, smaller, fast as MD5. In: Jacobson, M., Locasto, M., Mohassel, P., Safavi-Naini, R. (eds) Applied cryptography and network security, pp. 119–135, vol. 7954. Springer, Berlin, Heidelberg (2013)
Aumasson, J.-P., Meier, W., Phan, R.C.-W., Henzen, L: The hash function BLAKE. Springer, Berlin Heidelberg (2014)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.
About this paper
Cite this paper
EL Makhtoum, H., Bentaleb, Y. (2022). Comparative Study of Keccak and Blake2 Hash Functions. In: Ben Ahmed, M., Teodorescu, HN.L., Mazri, T., Subashini, P., Boudhir, A.A. (eds) Networking, Intelligent Systems and Security. Smart Innovation, Systems and Technologies, vol 237. Springer, Singapore. https://doi.org/10.1007/978-981-16-3637-0_24
Download citation
DOI: https://doi.org/10.1007/978-981-16-3637-0_24
Published:
Publisher Name: Springer, Singapore
Print ISBN: 978-981-16-3636-3
Online ISBN: 978-981-16-3637-0
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)