K = 01 23 45 67
L = 89 ab c def
M = fe dc ba 9 8
N = 7 6 5 4 3 2 10
4. Processing of messages in 16-word blocks to produce the final
output
Each 5 12-bit block gets broken down further into 16 sub-blocks
of 3 2 bits each. There are four rounds of operations, with each
round utilizing all the sub-blocks, the buffers, and a constant
array value. This constant array can be denoted as T[ 1] ≥ T[ 64] .
Each of the sub-blocks is denoted as M[ 0] ≥ M[ 15 ] .
4. BLAKE 2
A cryptographic hash function faster than MD5 , SHA-1, SHA-2, and
SHA-3 are BLAK E 2. It is secure as the latest standard SHA-3 and has
been adopted by many proj ects due to its high speed, security, and
simplicity.
BLAK E 2 comes in two flavors:
BLAK E 2b is optimized for 64-bit platforms—
including NEON—
enabled ARMs and produces digests of any size between 1 and 64
bytes.
BLAK E 2s is optimized for 8– 3 2-bit platforms and produces digests
of any size between 1 and 3 2 bytes.
BLAK E 2 includes the 4-way parallel BLAK E 2bp and 8-way parallel
BLAK E 2sp designed for increased performance on multicore or
SIMD CPU s. BLAK E 2 offers these algorithms tuned to your specific
requirements, such as keyed hashing (that is, Mac or PRF), hashing
with a salt updatable or incremental tree-hashing, or any combination
thereof.
BLAK E 2 also includes the BLAK E 2x variants, which can produce
digests of arbitrary length.
BLAK E 2 shines on 64-bit CPU s: on an Intel Core i5 -6600 (Skylake
Microarchitecture 3 ,3 10 MHz), BLAK E 2b can process 1 gigabyte per
second or a speed rate of 3 .08 cycles per byte.