K = 01 23 45 67

L = 89 ab c def

M = fe dc ba 9 8

N = 7 6 5 4 3 2 10

4. Processing of messages in 16-word blocks to produce the final

output

Each 5 12-bit block gets broken down further into 16 sub-blocks

of 3 2 bits each. There are four rounds of operations, with each

round utilizing all the sub-blocks, the buffers, and a constant

array value. This constant array can be denoted as T[ 1] ≥ T[ 64] .

Each of the sub-blocks is denoted as M[ 0] ≥ M[ 15 ] .

4. BLAKE 2

A cryptographic hash function faster than MD5 , SHA-1, SHA-2, and

SHA-3 are BLAK E 2. It is secure as the latest standard SHA-3 and has

been adopted by many proj ects due to its high speed, security, and

simplicity.

BLAK E 2 comes in two flavors:

BLAK E 2b is optimized for 64-bit platforms—

including NEON—

enabled ARMs and produces digests of any size between 1 and 64

bytes.

BLAK E 2s is optimized for 8– 3 2-bit platforms and produces digests

of any size between 1 and 3 2 bytes.

BLAK E 2 includes the 4-way parallel BLAK E 2bp and 8-way parallel

BLAK E 2sp designed for increased performance on multicore or

SIMD CPU s. BLAK E 2 offers these algorithms tuned to your specific

requirements, such as keyed hashing (that is, Mac or PRF), hashing

with a salt updatable or incremental tree-hashing, or any combination

thereof.

BLAK E 2 also includes the BLAK E 2x variants, which can produce

digests of arbitrary length.

BLAK E 2 shines on 64-bit CPU s: on an Intel Core i5 -6600 (Skylake

Microarchitecture 3 ,3 10 MHz), BLAK E 2b can process 1 gigabyte per

second or a speed rate of 3 .08 cycles per byte.