I'm currently trying to write the blake3 algorithm in JS using the official whitepaper or what it's called.
If I understand correctly then... after the 7 round keyed permutation (at the end of the compression function) the first half of the output values is then xor'ed with the latter half to get the NEW first half. And the latter half is xor'ed with "h0... h7", which AFAIK are the chaining values or the key from the state.
Now, if I only had one block and would hash it in keyed_hash mode, then at the end of the compression function, the last 8 values of the output block would be my key but xor'ed with the compressed values right? And that'd be basically the hash then. Feels a bit unsecure if I'm honest. Could this potentially reveal anything about the key? Especially when it comes to authenticated encryption?