Open-Awesome
CategoriesAlternativesStacksSelf-HostedExplore
Open-Awesome

© 2026 Open-Awesome. Curated for the developer elite.

TermsPrivacyAboutGitHubRSS
  1. Home
  2. Cryptography
  3. BLAKE3

BLAKE3

Apache-2.0Assembly1.8.4

A cryptographic hash function that is significantly faster than SHA-256, highly parallelizable, and serves as a PRF, MAC, KDF, and XOF.

GitHubGitHub
6.2k stars449 forks0 contributors

What is BLAKE3?

BLAKE3 is a cryptographic hash function that provides fast, secure hashing with additional capabilities like key derivation and message authentication. It is designed to be significantly faster than predecessors like SHA-256 while maintaining strong security guarantees and supporting parallel processing. The project includes official implementations in Rust and C, optimized for various CPU features.

Target Audience

Developers and systems engineers needing high-performance cryptographic hashing for applications such as data integrity verification, checksumming, secure messaging, or key derivation. It is also relevant for those implementing cryptographic protocols in performance-sensitive environments.

Value Proposition

BLAKE3 offers unparalleled speed and parallelism compared to other hash functions, along with a versatile design that supports multiple cryptographic modes in one algorithm. Its simplicity and optimization for modern hardware make it a compelling choice for replacing older hashes in new projects.

Overview

the official Rust and C implementations of the BLAKE3 cryptographic hash function

Use Cases

Best For

  • High-performance data integrity checks and checksumming
  • Cryptographic applications requiring parallel hashing (e.g., large file processing)
  • Systems needing a unified hash for PRF, MAC, KDF, and XOF functionalities
  • Implementations where verified streaming or incremental updates are required
  • Replacing slower hash functions like SHA-256 in performance-critical code
  • Cross-platform projects needing consistent hashing across x86-64 and ARM architectures

Not Ideal For

  • Password hashing or key derivation from passwords (explicitly not recommended; use Argon2 instead)
  • Projects requiring FIPS-compliant or NIST-standardized cryptographic algorithms for regulatory reasons
  • Systems that must interoperate with legacy protocols locked into SHA-2 or MD5 for compatibility
  • Environments where algorithm diversity is critical and BLAKE3's relative newness is a security concern

Pros & Cons

Pros

Unmatched Performance

Benchmarks show it is significantly faster than MD5, SHA-2, and BLAKE2, with optimized implementations for SSE, AVX, NEON, and WASM that leverage automatic CPU feature detection.

Inherent Parallelism

Its Merkle tree design allows efficient scaling across multiple threads and SIMD lanes, making it orders of magnitude faster than traditional hashes for large data on modern hardware.

Cryptographic Flexibility

Serves as a secure hash, PRF, MAC, KDF, and XOF in one algorithm, reducing the need for multiple cryptographic primitives in applications.

Streaming and Verification

Supports incremental updates and verified streaming via its Merkle structure, enabling efficient hashing of data in chunks without sacrificing integrity.

Cons

Ecosystem Immaturity

Despite growing adoption, BLAKE3 lacks the widespread library support and tooling of SHA-256, which can complicate integration into existing systems or legacy codebases.

No Formal Standardization

It is not yet a NIST standard or FIPS-approved, which may be a barrier for use in government, financial, or other regulated industries requiring certified algorithms.

Optimization Complexity

The highly optimized implementations rely on runtime CPU feature detection and SIMD, which can obscure the core algorithm and make debugging or porting to niche platforms more challenging.

Frequently Asked Questions

Quick Stats

Stars6,177
Forks449
Contributors0
Open Issues114
Last commit10 days ago
CreatedSince 2019

Tags

#parallel-computing#key-derivation#simd#c#data-integrity#merkle-tree#cryptography#rust

Built With

R
Rust
C
C++

Included in

Cryptography6.8k
Auto-fetched 1 day ago

Related Projects

rustlsrustls

A modern TLS library in Rust

Stars7,357
Forks818
Last commit2 days ago
OckamOckam

Orchestrate end-to-end encryption, cryptographic identities, mutual authentication, and authorization policies between distributed applications – at massive scale.

Stars4,614
Forks558
Last commit3 months ago
ringring

An experiment.

Stars4,075
Forks788
Last commit3 days ago
ragerage

A simple, secure and modern file encryption tool (and Rust library) with small explicit keys, no config options, and UNIX-style composability.

Stars3,444
Forks151
Last commit2 days ago
Community-curated · Updated weekly · 100% open source

Found a gem we're missing?

Open-Awesome is built by the community, for the community. Submit a project, suggest an awesome list, or help improve the catalog on GitHub.

Submit a projectStar on GitHub