<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>Comparative Analysis of Cryptographic Hash Functions in Blockchain Systems</article-title>
      </title-group>
      <contrib-group>
        <contrib contrib-type="author">
          <string-name>Oleksandr Kuznetsov</string-name>
          <email>kuznetsov@karazin.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
          <xref ref-type="aff" rid="aff1">1</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Oleksandr Peliukh</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Nikolay Poluyanenko</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Serhii Bohucharskyi</string-name>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <contrib contrib-type="author">
          <string-name>Ievgeniia Kolovanova</string-name>
          <email>e.kolovanova@karazin.ua</email>
          <xref ref-type="aff" rid="aff0">0</xref>
        </contrib>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Information and Communication Systems Security, School of Computer Sciences, V. N. Karazin Kharkiv National University</institution>
          ,
          <addr-line>4 Svobody sq., 61022 Kharkiv</addr-line>
          ,
          <country country="UA">Ukraine</country>
        </aff>
        <aff id="aff1">
          <label>1</label>
          <institution>Department of Political Sciences, Communication and International Relations, University of Macerata</institution>
          ,
          <addr-line>30/32 Via Crescimbeni, 62100 Macerata</addr-line>
          ,
          <country country="IT">Italy</country>
        </aff>
      </contrib-group>
      <fpage>81</fpage>
      <lpage>94</lpage>
      <abstract>
        <p>In the burgeoning realm of digital technologies, blockchain has emerged as a revolutionary force, underpinned by the intricate fabric of cryptographic hash functions. This study provides a comprehensive evaluation of various hash functions, delineating their processing efficacies across a spectrum of input block sizes. Through rigorous empirical analysis, our research juxtaposes the performance metrics of ten distinct algorithms, thereby offering invaluable insights into their respective computational robustness. Notably, our findings underscore the complexities inherent in the selection of an appropriate hash function for blockchain applications. Beyond mere processing speeds, the selection process requires a nuanced understanding of cryptographic resilience, adaptability to emerging threats, and seamless integration with prevailing infrastructures. While our results furnish a contemporaneous benchmark, they also accentuate the imperative for incessant research and adaptation in an ever-evolving digital landscape. This investigation serves both as a reference point for current blockchain applications and a clarion call for sustained innovation in the quest for optimized cryptographic solutions. The overarching aim is to fortify the blockchain's promise by ensuring its security and performance through the judicious application of cryptographic hash functions, thereby catalyzing a more decentralized, efficient, and secure digital future.</p>
      </abstract>
      <kwd-group>
        <kwd>1 Blockchain</kwd>
        <kwd>cryptographic hash functions</kwd>
        <kwd>processing efficiency</kwd>
        <kwd>digital evolution</kwd>
        <kwd>decentralized systems</kwd>
      </kwd-group>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>1. Introduction</title>
      <p>
        In the contemporary era of digital
communication and data exchange,
cryptographic hash functions play an
indispensable role in ensuring data integrity,
authentication, and security [
        <xref ref-type="bibr" rid="ref1">1</xref>
        ]. A
cryptographic hash function is a mathematical
algorithm that takes an input (or “message”)
and produces a fixed-size string of characters,
which is typically a sequence of numbers and
letters [2–3]. These functions are designed
such that even a minute change in the input
will produce a drastically different output,
making them fundamental tools in the fields of
cryptography, cyber-security, and, notably,
blockchain technology [4].
      </p>
      <p>Blockchain, a decentralized and distributed
ledger system, relies heavily on cryptographic
hash functions for its operation [5]. The core
principle behind blockchain’s security and
integrity is the continuous chaining of blocks
using cryptographic hashes [6–7]. Given the
growing significance of blockchain in various
applications, ranging from financial
transactions to supply chain management, the these algorithms, providing insights into their
efficiency, security, and performance of the behavior under both minimal and substantial
hashing algorithms employed are of loads.
paramount importance [8]. 3. Performance Metrics: The core metrics</p>
      <p>
        Among the myriad of hash functions, SHA2 used for gauging the performance of each hash
[
        <xref ref-type="bibr" rid="ref7">9–10</xref>
        ], SHABAL [
        <xref ref-type="bibr" rid="ref3 ref8 ref9">11–12</xref>
        ], SHAVITE [
        <xref ref-type="bibr" rid="ref10 ref9">12–13</xref>
        ], algorithm are as follows:
Keccak [
        <xref ref-type="bibr" rid="ref11 ref12">14–15</xref>
        ], and Blake [
        <xref ref-type="bibr" rid="ref13 ref9">12, 16</xref>
        ] have • Cycles/byte: This metric evaluates the
emerged as frontrunners in contemporary number of processor cycles required to
blockchain projects. Each of these algorithms process each byte of data. A lower value
offers unique characteristics in terms of indicates a more efficient algorithm in
security, computational requirements, and terms of computational cycles.
resistance against various attack vectors [17– • MB/sec: Measuring the Megabytes
18]. processed per second, this metric offers
      </p>
      <p>This paper embarks on a comprehensive a direct view into the throughput of the
comparative analysis of these widely adopted algorithm. A higher MB/sec value
cryptographic hash algorithms. Through suggests a faster hashing capability, ideal
rigorous benchmarking and assessment, we for real-time or large-scale applications.
aim to elucidate their respective strengths, • KHash/sec: Representing the thousands
vulnerabilities, and performance metrics. This of hashes computed per second,
exploration serves not only to guide current KHash/sec offers insights into the sheer
blockchain implementations but also to inform speed of the algorithm, especially
future innovations in the realm of valuable for applications like mining
cryptographic research and development. where the hash rate is a critical
parameter.</p>
    </sec>
    <sec id="sec-2">
      <title>2. Methodology</title>
      <p>The comparative evaluation of cryptographic
hash algorithms necessitates a robust and
reproducible methodology. A structured
approach ensures the reliability of results,
enabling meaningful comparisons that can
guide both academic research and practical
implementations. In this study, we have
adopted the following methods to
systematically evaluate the aforementioned
hash functions.</p>
      <sec id="sec-2-1">
        <title>1. Hardware and Software Configuration:</title>
        <p>The testing environment was standardized
using an Intel Core i9-7980 with a clock speed
of 2.60 GHz. Such a high-performance platform
ensures consistency in testing, eliminating
potential bottlenecks that might bias results.
The operating system deployed was Windows
10, which provides a stable environment with
widespread adoption in both academic and
commercial sectors.</p>
        <p>2. Data Sets: To understand how these hash
functions perform across varying data lengths,
a range of data sizes was chosen. Specifically,
we used 21 distinct data lengths starting from
2020 bytes (or 1 byte) to 220220 bytes. The
exponential progression aids in capturing the
potential non-linear scaling characteristics of</p>
        <p>Each hashing algorithm was run multiple
times for each data length to ensure statistical
robustness. The results were then averaged to
minimize the potential influence of outliers or
sporadic system interruptions.</p>
        <p>In summary, our methodology provides a
comprehensive and systematic approach to
evaluate the speed and efficiency of leading
cryptographic hash algorithms, paving the way
for informed decisions in blockchain
implementations and other applications where
hash functions play a crucial role.</p>
      </sec>
    </sec>
    <sec id="sec-3">
      <title>3. Hash Algorithms in Blockchain</title>
    </sec>
    <sec id="sec-4">
      <title>Systems</title>
      <p>
        The bedrock of blockchain technology, a
decentralized ledger system, is cryptographic
hashing. These algorithms ensure that data
remains intact and unchanged, providing a layer
of security and authenticity to transactions. In
this section, we explore the specific hash
algorithms that have found prominence in the
blockchain sphere, illuminating their distinctive
features and their adoption rationale in various
blockchain projects.
1. SHA-256 [
        <xref ref-type="bibr" rid="ref7">9–10</xref>
        ]:
• Description: A member of the SHA-2
(Secure Hash Algorithm 2) family,
SHA256 produces a 256-bit (32-byte) hash.
It’s known for its security and
computational efficiency.
• Blockchain Adoption: Perhaps the most
famous application of SHA-256 is in
Bitcoin, the pioneering cryptocurrency
[
        <xref ref-type="bibr" rid="ref16">19</xref>
        ]. The developers of Bitcoin opted for
SHA-256 due to its strong collision
resistance and widespread recognition
as a secure algorithm.
2. SHA-512 [
        <xref ref-type="bibr" rid="ref7">9–10</xref>
        ]:
• Description: Also from the SHA-2 family,
this produces a 512-bit hash, offering
even more robust security, albeit at a
higher computational cost.
• Blockchain Adoption: Some blockchain
platforms choose SHA-512 for added
security layers in specific components
where computational efficiency is not
the primary concern.
3. SHABAL-256 &amp; SHABAL-512 [
        <xref ref-type="bibr" rid="ref3 ref8 ref9">11–12</xref>
        ]:
• Description: These are cryptographic
hash functions with output lengths of 256
and 512 bits respectively.
• Blockchain Adoption: While not as
ubiquitous as SHA variants, they find use
in some niche blockchain applications
due to their unique cryptographic
properties.
4. SHAVITE-256 &amp; SHAVITE-512 [
        <xref ref-type="bibr" rid="ref10 ref9">12–13</xref>
        ]:
• Description: SHAVITE is a family of hash
functions designed to be efficient on a
variety of platforms, especially
hardware implementations.
• Blockchain Adoption: Some blockchain
projects that emphasize hardware-based
transactions or have specific hardware
considerations might lean towards
SHAVITE for its efficiency in such
contexts.
5. Keccak-256 &amp; Keccak-512 [
        <xref ref-type="bibr" rid="ref11 ref12">14–15</xref>
        ]:
• Description: Keccak is the basis for the
SHA-3 standard. It’s recognized for its
sponge construction which offers a high
degree of flexibility and security.
• Blockchain Adoption: Ethereum, a
leading smart contract platform, uses
Keccak-256. The choice stemmed from
Keccak’s distinction as a winner of the
NIST hash function competition and its
perceived security advantages over
SHA2.
6. Blake-256 &amp; Blake-512 [
        <xref ref-type="bibr" rid="ref10 ref11 ref12 ref13 ref9">12–16</xref>
        ]:
• Description: BLAKE is notable for its
speed and high-security levels. It’s
simpler in design than SHA-2, leading to
potential advantages in performance.
• Blockchain Adoption: Siacoin, a
decentralized storage platform, employs
Blake-256. The developers favored its
blend of speed and security, particularly
important for a system that frequently
processes large amounts of data.
      </p>
      <p>In summation, the choice of a hashing
algorithm in a blockchain project is
multifaceted. Factors like security,
computational efficiency, specific platform
considerations, and even historical trust play a
role. As blockchain technology continues to
evolve, so will its reliance on these
cryptographic backbones, making their study
and understanding even more crucial.</p>
    </sec>
    <sec id="sec-5">
      <title>4. Results</title>
      <sec id="sec-5-1">
        <title>4.1. Performance Analysis of SHA2256 and SHA2-512</title>
        <p>In our pursuit to comprehend the
computational efficiency and performance of
popular cryptographic hash functions, we
subjected SHA2-256 and SHA2-512 to rigorous
benchmarking. The tests were conducted on a
64-bit platform powered by Intel Core i9-7980
running at 2.60 GHz. The following sections
offer a detailed analysis and a summary of
Table 1 that amalgamates the results for both
hash algorithms.</p>
        <p>Analysis and Commentary:
• Observing the Cycles/byte for both
algorithms, SHA2-256 begins with a
considerably higher number of cycles for
smaller input blocks. However, as the
input size increases, the efficiency in
terms of cycles/bytes tends to converge
for both algorithms. Notably, SHA2-512
maintains a consistent trend and is
marginally less efficient for larger input
sizes compared to SHA2-256.
• In terms of MB/sec, a similar pattern
emerges where SHA2-512 has a slightly
lower throughput compared to
SHA2256, especially evident in larger input
blocks. The throughput for both
algorithms dramatically increases as the
input block size grows, with SHA2-512
reaching a peak of around 369.87
MB/sec at 220 bytes.
• The KHash/sec metric is particularly
revealing. For smaller data blocks,
SHA2256 seems to achieve higher hashing
speeds. However, as the input block size
increases, both algorithms experience a
stark reduction in their KHash/sec.
Notably, the drop in performance for
SHA2-512 is more precipitous,
especially after 26 bytes, reflecting a
decrease of almost half.
• When juxtaposed, SHA2-256 generally
offers better computational efficiency
and higher throughput for most input
sizes. However, the choice between the
two would also depend on security
requirements, as SHA2-512, with its
larger hash size, could offer stronger
cryptographic security.
• In conclusion, the performance metrics
highlight the inherent trade-offs
between computational efficiency and
cryptographic strength. While SHA2-256
demonstrates superior performance in
most scenarios, the choice to use
SHA2512 might be motivated by heightened
security concerns. As with any
cryptographic decision, understanding
the context and requirements of the
application remains paramount.
945.51
472.36
236.28
118.07
59.05
29.48
14.79
14.36
10.70
8,84
7.94
7.52
7.24
7.13
7.13
7.04
7.03
7.01
7.02
7.01
7.02
2.74
5.49
10.98
21.94
43.93
87.89
175.35
180.85
243.01
292,57
327.37
346.98
357.63
363.71
366.63
368.70
368.70
368.96
369.09
368.83
369.87</p>
      </sec>
      <sec id="sec-5-2">
        <title>4.2. Performance Analysis of</title>
      </sec>
      <sec id="sec-5-3">
        <title>SHABAL-256 and SHABAL-512</title>
        <p>• Both SHABAL-256 and SHABAL-512
show a clear pattern where the cycles
per byte decrease (indicative of
improved efficiency) as the size of the
input block increases. This suggests that
both algorithms are designed to process
larger data blocks more efficiently than
smaller ones. However, SHABAL-256,
generally requires slightly fewer cycles
per byte compared to SHABAL-512,
emphasizing its higher efficiency in
processing data.
• As the input block size increases, the
megabytes processed per second
(MB/sec) also increase, reaching an
asymptotic limit. Both algorithms have
comparable throughputs, but
SHABAL256 tends to outperform SHABAL-512
for larger block sizes.
• The kilohashes per second (KHash/sec)
reflect the speed at which the system can
compute the hash values. The rate
decreases with the size of the input
block. The decrease is steeper for
SHABAL-512, indicating it may require
more computational resources to hash
larger blocks compared to its
SHABAL256 counterpart.
• The data suggests that for tasks requiring
a balance between security and efficiency,
SHABAL-256 might be preferable due to
its slightly better efficiency metrics.
However, for tasks where the higher
cryptographic strength of a 512-bit hash
is necessary, the SHABAL-512, despite its
slight performance penalty, would be the
algorithm of choice.</p>
        <p>In conclusion, the choice between
SHABAL256 and SHABAL-512 would be contingent on
the specific application requirements and the
trade-off between security and performance
one is willing to accept. This detailed
performance analysis offers practitioners
insights to make informed decisions on the
appropriate cryptographic algorithm selection
for their needs.</p>
      </sec>
      <sec id="sec-5-4">
        <title>4.3. Performance Analysis of</title>
      </sec>
      <sec id="sec-5-5">
        <title>SHAVITE-256 and SHAVITE-512</title>
        <p>The following section delineates a
comprehensive analysis of the performance
metrics associated with the SHAVITE-256 and
SHAVITE-512 cryptographic hash algorithms.
Both were tested on a 64-bit computational
platform, specifically an Intel Core i9-7980
clocked at 2.60 GHz. Table 3 provides a
consolidated overview of these findings.
Analysis and Commentary:
• A striking observation is that
SHAVITE256 is significantly more efficient in
terms of cycles per byte compared to
SHAVITE-512, particularly for smaller
input block sizes. This suggests that
SHAVITE-256 can process data more
swiftly, thereby rendering it more
suitable for applications that prioritize
speed.
• When it comes to MB/sec, SHAVITE-256
consistently outperforms SHAVITE-512
across all input block sizes. The data
delineates a trend where MB/sec
increases for SHAVITE-256 as block size
augments, indicating efficient data
processing for larger blocks. On the other
hand, SHAVITE-512 starts with a low
throughput, which gradually increases
with block size but never surpasses
SHAVITE-256.
• The kilohashes per second (KHash/sec)
provide insights into the hashing
capabilities of the system. While both
algorithms show a declining trend with
increasing block size, SHAVITE-256
showcases a steep decline after a certain
threshold, suggesting some limitations in
handling larger blocks efficiently.
• Overall, SHAVITE-256 appears to be
more performance-centric, delivering
faster results with less computational
overhead. In contrast, SHAVITE-512,
albeit less efficient, might offer a more
robust cryptographic strength due to its
larger hash size.</p>
        <p>In summation, the distinction between
opting for SHAVITE-256 or SHAVITE-512
depends heavily on the specific application’s
requirements, emphasizing the trade-off
between computational efficiency and
cryptographic resilience. This empirical
analysis provides a solid foundation for
stakeholders to make an informed decision
regarding the selection of an appropriate
cryptographic algorithm tailored to their
specific needs.</p>
      </sec>
      <sec id="sec-5-6">
        <title>4.4. Performance Analysis of</title>
      </sec>
      <sec id="sec-5-7">
        <title>KECCAK-256 and KECCAK-512</title>
        <p>The subsequent section presents an analysis of
the performance metrics associated with the
KECCAK-256 and KECCAK-512 cryptographic
hash algorithms. These were rigorously tested
on a 64-bit computational platform utilizing an
Intel Core i9-7980, clocked at 2.60 GHz. A
synthesized overview is captured in Table 4.</p>
        <p>Analysis and Commentary:
• Comparatively, KECCAK-256 and
KECCAK-512 present close competition
in terms of cycles per byte, especially
when handling smaller input block sizes.
This close margin hints at their
underlying similarities in algorithmic
efficiency.
• Observing the MB/sec, KECCAK-512
marginally outperforms KECCAK-256,
albeit the differences are subtle. As block
size increases, both algorithms exhibit
an exponential growth in MB/sec,
underscoring the efficiency of both
KECCAK variants for processing larger
blocks.
• The KHash/sec metric reveals
interesting trends. Both algorithms start
strong but undergo a drastic reduction in
hashing speed when handling larger
blocks. Notably, KECCAK-512 seems to
suffer a sharper drop in KHash/sec than
KECCAK-256 for the same data sizes,
post the input block size of 227 bytes.
• At a broad level, while KECCAK-256
seems slightly less efficient in data
processing (MB/sec) compared to
KECCAK-512, its steadier hashing speed
(KHash/sec) might render it preferable
in scenarios where consistent hash rate
performance is crucial.</p>
        <p>In essence, the choice between
KECCAK256 and KECCAK-512 hinges upon specific
application demands, weighing the nuances
between data processing speed and hashing
consistency. This empirical scrutiny offers
stakeholders a substantial base for selecting an
optimal cryptographic hashing solution, that
resonates with their nuanced requirements.</p>
      </sec>
      <sec id="sec-5-8">
        <title>4.5. Performance Analysis of BLAKE256 and BLAKE-512</title>
        <p>This section elucidates the performance metrics
associated with the BLAKE-256 and BLAKE-512
cryptographic hash algorithms. Testing was
conducted on a 64-bit computational platform
powered by an Intel Core i9-7980 with a clock
speed of 2.60 GHz. For clarity and brevity, a
consolidated representation of the results is
furnished in Table 5.</p>
        <p>Analysis and Commentary:
• When contrasting BLAKE-256 and
BLAKE-512, the former showcases fewer
cycles per byte across most block sizes,
indicating enhanced efficiency. This
suggests that, on a byte-to-byte basis,
BLAKE-256 can process data more
expediently than its BLAKE-512
counterpart.
• MB/sec metrics reveal that BLAKE-256
consistently surpasses BLAKE-512 in
data processing rates. Especially for
larger block sizes, BLAKE-256’s ability to
sustain high throughput is particularly
noteworthy.
• The KHash/sec parameter for both
algorithms depicts an exponential decline
as block size increases. However,
BLAKE256 consistently delivers higher hashing
rates than BLAKE-512 until a certain data
size threshold, after which the hashing
speeds of both variants start to converge.
• BLAKE-256 seems to outperform
BLAKE512 in terms of both data processing and
hashing speed for the majority of block
sizes. This renders BLAKE-256 a more
favorable choice for applications where
speed and efficiency are pivotal.</p>
        <p>In conclusion, while both BLAKE variants
exhibit commendable performance,
BLAKE256 appears to have a slight edge in processing
and hashing capabilities over BLAKE-512 on
the tested platform. Decision-makers and
stakeholders are advised to evaluate these
empirical findings within the context of their
specific application needs, optimizing for
desired performance outcomes.</p>
      </sec>
    </sec>
    <sec id="sec-6">
      <title>5. Comparison of results</title>
      <sec id="sec-6-1">
        <title>5.1. Comparison of Cycles per Byte</title>
        <p>The Fig. 1 visualizes the cycles per byte for ten
different hashing algorithms, as a function of
input block size.</p>
        <p>Upon examining the data presented in the
Fig. 1, several observations and conclusions can
be made:
• The Cycles/byte varies widely among the
algorithms, demonstrating the diverse
efficiency levels of these algorithms. For
instance, when considering the smallest
input block size of one byte, BLAKE-256
shows the highest efficiency with the least
cycles, whereas SHAVITE-512 consumes
the most.
• As the input block size increases, the
difference in efficiency between
algorithms tends to diminish. This
implies that the overheads affecting the
efficiency of algorithms are relatively
more prominent for smaller block sizes.
• Certain algorithms, like BLAKE-256 and
BLAKE-512, maintain a relatively
consistent performance regardless of the
input block size. On the other hand,
algorithms like SHAVITE-512 show
drastic improvements as the input block
size increases.
• For most algorithms, efficiency in terms
of Cycles/byte seems to stabilize or reach
an asymptotic value beyond an input
block size of 8KB (8192 bytes). This
suggests that using block sizes above this
might not provide significant gains in
terms of computational efficiency.
• For algorithms that have both 256-bit and
512-bit versions, it is evident that the
256-bit version is generally more efficient
in terms of Cycles/byte. This is expected
due to the reduced computational
complexity associated with smaller bit
sizes.
• Among all, BLAKE-256 consistently
stands out as one of the most efficient
algorithms across all input block sizes.
Conversely, SHAVITE-512, while initially
being the least efficient for smaller block
sizes, sees significant improvement as
block size increases.
• While cycles per byte is an important
metric for computational efficiency, it’s
essential to consider other factors like
security, implementation complexity, and
compatibility when selecting a hashing
algorithm for real-world applications.</p>
        <p>In conclusion, the choice of a hashing
algorithm should not solely rely on cycles per
byte but should be a holistic decision based on
various performance metrics and specific
application requirements. However, from a
pure efficiency perspective, BLAKE-256
exhibits excellent performance across a wide
range of input block sizes.</p>
        <p>This analysis provides valuable insights for
developers and organizations looking to
optimize their cryptographic operations,
ensuring both security and performance are
maintained at optimal levels.
Cycles/byte
10000
1000
100
10
1</p>
      </sec>
      <sec id="sec-6-2">
        <title>5.2. Comparison of Hashing</title>
      </sec>
      <sec id="sec-6-3">
        <title>Algorithms by Throughput</title>
        <p>Fig. 2 visualizes the performance of 10
cryptographic hashing algorithms across varying
input block sizes, measured in MB/sec.</p>
        <p>The results indicate a non-uniform
performance landscape across the studied
algorithms and input block sizes. Several key
observations can be deduced:
• Almost all algorithms show increased
throughput as the input block size
increases. This trend likely represents the
amortization of initialization and
finalization costs over larger data blocks.</p>
        <p>However, there’s a plateauing effect
observed in most algorithms, indicating an
approach towards their maximum
throughput capacity.
• By the largest input block size (1048576
bytes), the BLAKE-512 algorithm emerged
as the leading performer with 438 MB/sec,
closely followed by SHABAL-256 and
SHABAL-512. This implies that in
scenarios requiring high-throughput
hashing of larger data chunks, these
algorithms would be preferable.
• KECCAK-256 exhibits a remarkably stable
growth in throughput as the block size
increases, without any significant dips or
spikes. This consistent performance might
make it a preferable choice in
environments where input sizes can vary
significantly, ensuring predictable hashing
rates.
• For the smallest input block size (1 byte),
several algorithms show significantly
reduced throughput, most notably
SHAVITE-512. This is an important
consideration for applications dealing
with a large number of small-sized data
blocks.
• Interestingly, for many algorithms, their
512-bit variants (like SHA2-512 and
SHAVITE-512) don’t necessarily double
the throughput compared to their 256-bit
counterparts. This suggests that the
performance does not linearly scale with
the bit length, and other internal
algorithmic factors play a significant role.
• Despite its performance with smaller
block sizes, SHABAL-512 showed a
significant jump in throughput once the
block size exceeded 64 bytes, overtaking
many competitors. This behavior
underscores the importance of
benchmarking cryptographic algorithms
over a diverse range of input sizes.</p>
        <p>In conclusion, while raw throughput is an
essential metric, selecting a hashing algorithm
for practical applications should consider other
factors like security guarantees, implementation
complexity, and specific use-case requirements.</p>
        <p>The diverse performance landscape observed
underscores the importance of nuanced,
application-specific benchmarking before
settling on a cryptographic primitive.</p>
        <p>MB/sec
1000
100
10
1
2160241845476
65536
16384
4096
1024
1 4 1664256</p>
        <p>Input Block Size (bytes)
0,1
Figure 2: Comparison of Hashing Algorithms by Throughput (MB/sec)</p>
      </sec>
      <sec id="sec-6-4">
        <title>5.3. Performance Comparison by</title>
      </sec>
      <sec id="sec-6-5">
        <title>KHash/sec Criterion</title>
        <p>In this rigorous performance assessment, we
aim to dissect and analyze the throughput of
various cryptographic hash functions,
delineating their performance in kilohashes
per second (KHash/sec). This metric offers a
comprehensive understanding of how swiftly
each algorithm can process input data,
rendering it a quintessential element in
evaluating and benchmarking cryptographic
protocols (Fig. 3).</p>
        <p>Several key observations can be deduced:
• From a cursory glance at the dataset, it’s
palpable that the KHash/sec for each
algorithm plummets as the input block
size burgeons. This is a quintessential
behavior as a larger input block
demands greater computational power
and time, thereby reducing the
KHash/sec.
• The SHA2-256 and SHA2-512
demonstrate a fascinating interplay.
Initially, SHA2-256 marginally
outperforms its 512 counterpart for
smaller block sizes. However, as we
approach larger block sizes, SHA2-512
emerges as the preeminent variant, even
doubling the throughput of SHA2-256 in
some tests.
• The performance degradation is
particularly pronounced for
SHABAL256 and SHABAL-512. For minuscule
block sizes, their throughput is
analogous, but as the block size
escalates, SHABAL-512’s performance
slightly trumps SHABAL-256,
showcasing its optimized efficiency for
handling larger data chunks.
• SHAVITE-256 consistently supersedes
SHAVITE-512 across all block sizes. This
could be attributed to the inherent
architectural decisions made during its
design, emphasizing speed for 256-bit
processing.
• KECCAK-256 and KECCAK-512 both
experience an intriguing surge around
64 bytes, but KECCAK-256’s advantage
wanes post this point, with its
performance plummeting precipitously.
In contrast, KECCAK-512 maintains a
more consistent (albeit declining)
trajectory, highlighting its robustness
against variable input sizes.
• Of particular note is BLAKE-256 and
BLAKE-512’s relatively stable
performance, with the latter consistently
outshining the former as block sizes
enlarge. This consistency might be
emblematic of BLAKE’s resilience and
adaptability across diverse data sizes.
• For smaller block sizes, BLAKE-256
reigns supreme, but as we transition to
heftier blocks, the crown oscillates
between BLAKE-512, SHABAL-512, and
SHA2-512.</p>
        <p>Cryptographic hash function performance
is contingent upon a myriad of factors,
including design principles, input block size,
and implementation nuances. While this
empirical analysis provides a granular
breakdown of their respective efficacies,
practitioners must weigh these results against
their specific use-case scenarios and
constraints. In realms where speed is of the
essence, selecting an algorithm with superior
KHash/sec is paramount. Conversely, in more
security-sensitive domains, one might
prioritize cryptographic strength and
resistance to attacks over sheer speed.
KHash/sec
10000
1000
100
10
1
0,1</p>
      </sec>
    </sec>
    <sec id="sec-7">
      <title>6. Discussion</title>
      <p>In the rapidly evolving landscape of digital
technologies, the performance of
cryptographic hash functions takes on
heightened importance. The results outlined in
the previous section present a comprehensive
understanding of how varying cryptographic
algorithms fare in terms of processing speeds
across diverse input block sizes. To
contextualize these findings, it’s essential to
dive into their implications, especially within
the ambit of blockchain systems.</p>
      <p>1. The Imperative of Hash Functions in
Blockchain. At the core of blockchain
technology lies the unassailable need for
data integrity, authentication, and
security. Cryptographic hash functions
are the lynchpin that holds this edifice
together. Every transaction or data entry
within a block is hashed, and this hash is
woven into the very fabric of the
blockchain, ensuring both its veracity
and its inviolability. The choice of a hash
function, therefore, isn’t a trivial one; it
can profoundly shape the efficacy,
scalability, and security of a blockchain
system.
2. Throughput versus Security. While our
study primarily focused on performance
in terms of KHash/sec, it is crucial to
remember that in the blockchain realm,
speed isn’t the sole desideratum. A
balance must be struck between
processing speed and cryptographic
robustness. For instance, while
BLAKE256 showcased stellar performance for
smaller block sizes, it’s imperative to
assess its resilience against potential
cryptographic attacks, especially in a
blockchain setting where a
compromised hash function can have
cataclysmic consequences.
3. Scalability Concerns. As blockchain
systems burgeon in size and complexity,
they grapple with scalability issues.
Here, the hash function’s performance
for larger block sizes becomes especially
pertinent. Functions like BLAKE-512,
which demonstrate consistent
throughput across escalating block sizes,
might be particularly suited for
burgeoning blockchain networks,
ensuring that transaction processing
remains brisk even as the system grows.
4. Adaptability and Future-Proofing. The
landscape of digital threats is in constant
flux. As cryptographic methodologies
evolve, so do the techniques employed
by malicious actors. Hence, it’s pivotal
for blockchain systems not just to adopt
algorithms that are robust today but
ones that can stand the test of time.
KECCAK’s consistent trajectory, for
instance, might hint at its future
adaptability.
5. Beyond Performance: Other
Considerations. While our focus has
been squarely on KHash/sec, blockchain
architects must also consider other
facets like power consumption, ease of
implementation, and compatibility with
existing systems. A hash function might
be blazingly fast, but if it demands
exorbitant computational power, it
might not be tenable for
energyconscious implementations.</p>
      <p>
        In summation, while the performance
metrics provided in our study furnish
invaluable insights into the prowess of various
cryptographic hash functions, they are but one
piece of the puzzle. For blockchain systems, the
choice of a hash function is a nuanced decision,
interweaving concerns of speed, security,
scalability, and sustainability [
        <xref ref-type="bibr" rid="ref17 ref18 ref19">20–22</xref>
        ]. As
blockchain continues to reshape industries
and redefine paradigms, ensuring its
bedrock—the cryptographic hash function—is
optimally chosen becomes not just desirable
but indispensable
      </p>
    </sec>
    <sec id="sec-8">
      <title>7. Conclusion</title>
      <p>The relentless advance of technology has
positioned blockchain as a frontrunner in the
reshaping of our digital landscape. At the heart
of this transformative technology lie
cryptographic hash functions, serving as
sentinels guarding the sanctity and security of
data transactions. Our comprehensive study
has thrown into sharp relief the comparative
merits and demerits of various hash functions,
particularly in the context of their processing
speeds across diverse input block sizes.</p>
      <p>While our empirical data provides a
significant point of reference for determining
the efficiency of these algorithms, it also [2]
underscores a broader, more intricate
narrative. This narrative pivots on the need for
a delicate balance between performance and [3]
security, scalability and adaptability,
innovation and sustainability. The nuances of
choosing the right hash function for a specific
application—especially one as pivotal as [4]
blockchain—extend well beyond mere speed
metrics. They touch upon foundational
concerns like cryptographic resilience, [5]
adaptability to emerging threats, and
harmonious integration with existing
infrastructures.</p>
      <p>It is also paramount to acknowledge that
the digital milieu is in constant flux, with both
challenges and innovations emerging at an [6]
unprecedented pace. As such, while our
findings provide a robust benchmark for the
current scenario, they also serve as a testament
to the need for continuous research and
evolution in this domain.</p>
      <p>In the annals of technological evolution, [7]
blockchain stands out as a harbinger of both
promise and complexity. Ensuring its
unassailable security and optimal performance
will invariably hinge on the judicious choice
and implementation of cryptographic hash
functions. The hope is that our research, with [8]
its analytical rigor and insights, will inform and
inspire future endeavors in this critical
juncture of blockchain technology, propelling
it toward its fullest potential and shaping a [9]
more secure, efficient, and decentralized
digital future.</p>
    </sec>
    <sec id="sec-9">
      <title>8. Acknowledgments</title>
      <p>This project has received funding from the
European Union’s Horizon 2020 research and
innovation program under the Marie
Skłodowska-Curie grant agreement
No. 101007820—TRUST. This publication
reflects only the author’s view and the REA is
not responsible for any use that may be made
of the information it contains.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          [1]
          <string-name>
            <given-names>A.</given-names>
            <surname>Menezes</surname>
          </string-name>
          , P. van Oorschot,
          <string-name>
            <given-names>S.</given-names>
            <surname>Vanstone</surname>
          </string-name>
          , Handbook of Applied Cryptography, CRC Press (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1201/9780429466 335.
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          <string-name>
            <given-names>S.</given-names>
            <surname>Rubinstein-Salzedo</surname>
          </string-name>
          , Cryptography, Springer International Publishing (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1007/978-3-
          <fpage>319</fpage>
          -94818-8.
          <string-name>
            <given-names>R.</given-names>
            <surname>Klima</surname>
          </string-name>
          ,
          <string-name>
            <given-names>N.</given-names>
            <surname>Sigmon</surname>
          </string-name>
          , Cryptology : Classical and Modern, Chapman and Hall/CRC (
          <year>2018</year>
          ). doi:
          <volume>10</volume>
          .1201/9781315 170664.
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          11
          <string-name>
            <given-names>The</given-names>
            <surname>Hash</surname>
          </string-name>
          <string-name>
            <surname>Function</surname>
          </string-name>
          , Cryptography and
          <string-name>
            <given-names>Network</given-names>
            <surname>Security</surname>
          </string-name>
          , River Publishers, (
          <year>2022</year>
          )
          <fpage>197</fpage>
          -
          <lpage>204</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Bruen</surname>
          </string-name>
          ,
          <string-name>
            <given-names>M.</given-names>
            <surname>Forcinito</surname>
          </string-name>
          ,
          <string-name>
            <surname>J. McQuillan</surname>
          </string-name>
          , Blockchain and Bitcoin, Cryptography, Information Theory, and
          <article-title>ErrorCorrection: A Handbook for the 21st Century 26 (</article-title>
          <year>2021</year>
          )
          <fpage>549</fpage>
          -
          <lpage>560</lpage>
          . doi:
          <volume>10</volume>
          .1002/9781119582397.ch26. A.
          <string-name>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Modeling</surname>
            <given-names>CSIKE</given-names>
          </string-name>
          <article-title>Algorithm on Non-Cyclic Edwards Curves</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems</source>
          , vol.
          <volume>3288</volume>
          (
          <year>2022</year>
          )
          <fpage>1</fpage>
          -
          <lpage>10</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Bessalov</surname>
          </string-name>
          , et al.,
          <string-name>
            <surname>Multifunctional</surname>
            <given-names>CRS</given-names>
          </string-name>
          <article-title>Encryption Scheme on Isogenies of NonSupersingular Edwards Curves</article-title>
          , in: Workshop on Classic, Quantum, and
          <string-name>
            <surname>Post-Quantum</surname>
            <given-names>Cryptography</given-names>
          </string-name>
          , vol.
          <volume>3504</volume>
          (
          <year>2023</year>
          )
          <fpage>12</fpage>
          -
          <lpage>25</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          <string-name>
            <given-names>A.</given-names>
            <surname>Tiwari</surname>
          </string-name>
          , Chapter 14-Cryptography in Blockchain, Distributed Computing to Blockchain, (
          <year>2023</year>
          )
          <fpage>251</fpage>
          -
          <lpage>265</lpage>
          . doi:
          <volume>10</volume>
          .1016/B978-0
          <source>-323-96146-2</source>
          .
          <fpage>00011</fpage>
          -
          <lpage>5</lpage>
          .
          <string-name>
            <given-names>Secure</given-names>
            <surname>Hash</surname>
          </string-name>
          <article-title>Standard (SHS), Natl</article-title>
          . Ins. Stand. Technol. U.S. Department of Commerce (
          <year>2015</year>
          ). doi:
          <volume>10</volume>
          .6028/ NIST.FIPS.
          <volume>180</volume>
          -
          <fpage>4</fpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          [10]
          <string-name>
            <given-names>T.</given-names>
            <surname>Hansen</surname>
          </string-name>
          ,
          <string-name>
            <surname>D.</surname>
          </string-name>
          <article-title>Eastlake 3rd, US Secure Hash Algorithms (SHA and HMAC-SHA)</article-title>
          ,
          <source>RFC</source>
          (
          <year>2006</year>
          ). doi:
          <volume>10</volume>
          .17487/RFC4634.
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          [11]
          <string-name>
            <surname>Shabal</surname>
          </string-name>
          , (
          <year>2009</year>
          ). URL: https://web.archive.org/web/2009120 9170807/http://www.shabal.com/
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          [12]
          <string-name>
            <given-names>I.T.L</given-names>
            . Computer Security Division, SHA-3
            <surname>Project</surname>
          </string-name>
          (
          <year>2017</year>
          ). URL: https://csrc.nist.gov /projects/hash-functions/sha-3-project
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          [13]
          <string-name>
            <given-names>O.</given-names>
            <surname>Dunkelman</surname>
          </string-name>
          , E. Biham,
          <string-name>
            <surname>The SHAvite3-A New Hash</surname>
            <given-names>Function</given-names>
          </string-name>
          , Symmetric
          <string-name>
            <surname>Cryptography</surname>
          </string-name>
          (
          <year>2009</year>
          )
          <fpage>1</fpage>
          -
          <lpage>39</lpage>
          . doi:
          <volume>10</volume>
          .4230/DagSemProc.09031.18.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          [14]
          <article-title>NIST, NIST Releases SHA-3 Cryptographic Hash Standard (</article-title>
          <year>2015</year>
          ). URL: https://www.nist.gov/newsevents/news/2015/08/nist-releases
          <article-title>-sha -3-cryptographic-hash-standard</article-title>
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          [15]
          <article-title>SHA-3 Standard: Permutation-Based Hash</article-title>
          and
          <string-name>
            <surname>Extendable-Output</surname>
            <given-names>Functions</given-names>
          </string-name>
          , Natl. Ins. Stand. Technol. U.S. Department of Commerce (
          <year>2015</year>
          ). doi:
          <volume>10</volume>
          .6028/NIST.FIPS.
          <volume>202</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref13">
        <mixed-citation>
          [16]
          <fpage>BLAKE2</fpage>
          . URL: https://www.blake2.net/
        </mixed-citation>
      </ref>
      <ref id="ref14">
        <mixed-citation>
          [17]
          <string-name>
            <given-names>V.</given-names>
            <surname>Sokolov</surname>
          </string-name>
          ,
          <string-name>
            <given-names>P.</given-names>
            <surname>Skladannyi</surname>
          </string-name>
          ,
          <string-name>
            <given-names>H.</given-names>
            <surname>Hulak</surname>
          </string-name>
          ,
          <article-title>Stability Verification of Self-Organized Wireless Networks with Block Encryption</article-title>
          ,
          <source>in: 5th International Workshop on Computer Modeling and Intelligent Systems</source>
          , vol.
          <volume>3137</volume>
          (
          <year>2022</year>
          )
          <fpage>227</fpage>
          -
          <lpage>237</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref15">
        <mixed-citation>
          [18]
          <string-name>
            <given-names>V.</given-names>
            <surname>Grechaninov</surname>
          </string-name>
          , et al.,
          <article-title>Decentralized Access Demarcation System Construction in Situational Center Network</article-title>
          ,
          <source>in: Workshop on Cybersecurity Providing in Information and Telecommunication Systems II</source>
          , vol.
          <volume>3188</volume>
          , no.
          <issue>2</issue>
          (
          <year>2022</year>
          )
          <fpage>197</fpage>
          -
          <lpage>206</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref16">
        <mixed-citation>
          [19]
          <string-name>
            <given-names>B.</given-names>
            <surname>Bebeshko</surname>
          </string-name>
          , et al.,
          <source>Application of Game Theory</source>
          ,
          <article-title>Fuzzy Logic and Neural Networks for Assessing Risks and Forecasting Rates of Digital Currency</article-title>
          ,
          <source>Journal of Theoretical and Applied Information Technology</source>
          <volume>100</volume>
          (
          <issue>24</issue>
          ) (
          <year>2022</year>
          )
          <fpage>7390</fpage>
          -
          <lpage>7404</lpage>
          .
        </mixed-citation>
      </ref>
      <ref id="ref17">
        <mixed-citation>
          [20]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <article-title>Performance Analysis of Cryptographic Hash Functions Suitable for Use in Blockchain, Int</article-title>
          .
          <source>J. Comput. Netw. Inf. Secur</source>
          .
          <volume>13</volume>
          (
          <year>2021</year>
          )
          <fpage>1</fpage>
          -
          <lpage>15</lpage>
          . doi:
          <volume>10</volume>
          .5815/IJCNIS.
          <year>2021</year>
          .
          <volume>02</volume>
          .01.
        </mixed-citation>
      </ref>
      <ref id="ref18">
        <mixed-citation>
          [21]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <article-title>Performance of Hash Algorithms on GPUs for Use in Blockchain</article-title>
          ,
          <source>IEEE Int. Conf. Adv. Trends Inf. Theory</source>
          (
          <year>2019</year>
          )
          <fpage>166</fpage>
          -
          <lpage>170</lpage>
          . doi:
          <volume>10</volume>
          .1109/ATIT49449.
          <year>2019</year>
          .
          <volume>9030442</volume>
          .
        </mixed-citation>
      </ref>
      <ref id="ref19">
        <mixed-citation>
          [22]
          <string-name>
            <given-names>A.</given-names>
            <surname>Kuznetsov</surname>
          </string-name>
          , et al.,
          <article-title>Statistical Testing of Blockchain Hash Algorithms</article-title>
          , in: International Workshop on Conflict Management in Global Information Networks vol.
          <volume>2588</volume>
          (
          <year>2019</year>
          ).
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>