A cryptographic hash function that is significantly faster than SHA-256, highly parallelizable, and serves as a PRF, MAC, KDF, and XOF.
BLAKE3 is a cryptographic hash function that provides fast, secure hashing with additional capabilities like key derivation and message authentication. It is designed to be significantly faster than predecessors like SHA-256 while maintaining strong security guarantees and supporting parallel processing. The project includes official implementations in Rust and C, optimized for various CPU features.
Developers and systems engineers needing high-performance cryptographic hashing for applications such as data integrity verification, checksumming, secure messaging, or key derivation. It is also relevant for those implementing cryptographic protocols in performance-sensitive environments.
BLAKE3 offers unparalleled speed and parallelism compared to other hash functions, along with a versatile design that supports multiple cryptographic modes in one algorithm. Its simplicity and optimization for modern hardware make it a compelling choice for replacing older hashes in new projects.
the official Rust and C implementations of the BLAKE3 cryptographic hash function
Benchmarks show it is significantly faster than MD5, SHA-2, and BLAKE2, with optimized implementations for SSE, AVX, NEON, and WASM that leverage automatic CPU feature detection.
Its Merkle tree design allows efficient scaling across multiple threads and SIMD lanes, making it orders of magnitude faster than traditional hashes for large data on modern hardware.
Serves as a secure hash, PRF, MAC, KDF, and XOF in one algorithm, reducing the need for multiple cryptographic primitives in applications.
Supports incremental updates and verified streaming via its Merkle structure, enabling efficient hashing of data in chunks without sacrificing integrity.
Despite growing adoption, BLAKE3 lacks the widespread library support and tooling of SHA-256, which can complicate integration into existing systems or legacy codebases.
It is not yet a NIST standard or FIPS-approved, which may be a barrier for use in government, financial, or other regulated industries requiring certified algorithms.
The highly optimized implementations rely on runtime CPU feature detection and SIMD, which can obscure the core algorithm and make debugging or porting to niche platforms more challenging.
A modern TLS library in Rust
Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.
An experiment.
A simple, secure and modern file encryption tool (and Rust library) with small explicit keys, no config options, and UNIX-style composability.
Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.