Thursday, April 26, 2018
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Under-display Fingerprint Sensor for Smartphones is the New Trend
EU to Regulate Tech Giants' Online Business Practices, Move to Tackle Online Disinformation
Chinese Smartphone Shipments Decline by 21 Percent in Q1 2018
Strong Switch Sales Boost Nintendo's Profit
LG Electronics Operating Profit up in Q1 on Sales of Home Appliances and TVs
Chips Power Samsung's Record first-quarter Profit Despite Decline in OLED Sales
AMD's Revenue increased 40 Percent year-over-year
Qualcomm's Quarterly Profit Falls 51.5 Percent
Active Discussions
Which of these DVD media are the best, most durable?
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
Help make DVDInfoPro better with dvdinfomantis!!!
menu making
Optiarc AD-7260S review
cdrw trouble
 Home > News > Consumer Electronics > Sony De...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, December 15, 2008
Sony Develops Next Generation Cryptographic Hash Algorithm


Sony has developed a new secur

Called "AURORA", the hash algorithm maintains high security levels while providing both efficient software and hardware implementation capabilities, according to Sony. Sony and Nagoya University have submitted "AURORA" for consideration in the "SHA-3 competition", a selection process for next generation cryptographic hash functions overseen by the National Institute of Standards and Technology (NIST).

In recent years, the rapid advancement of cryptanalytic technologies such as SHA-1 and MD5, capable of deciphering cryptographic hash functions, have increased the requirement for new types of hash functions that feature the properties to withstand this progress. SHA-1 is a cryptographic hash algorithm developed by NIST, contained in the FIPS 180-2 standard. SHA-1 is well-known and widely used in many secure systems. MD5 is also a cryptographic hash function that had been widely used before the development of SHA-1. Recently, the vulnerability of both algorithms has been highlighted.

"AURORA" is a highly efficient cryptographic hash algorithm uses Sony's expertise accumulated thought the development of its secure and efficient block cipher, "CLEFIA?" developed by Sony in 2007. "AURORA" is designed to combine secure compression functions and advanced domain extension capabilities, with it's compression functions achieving advanced levels of security by connecting multiple functions to offer a broad mix of data. Furthermore, "AURORA" is suitable for use in various types of applications due to its repetitive structure and byte-oriented component design. "AURORA"'s domain extensions effectively connect underlying compression functions to each other to extend the applicable length of input messages and output values, realizing security levels capable of withstanding many cryptanalytic techniques.

When implemented in software, "AURORA-256" (the output length of which is 256-bit) achieves fastest speeds of 15.4 cycles/byte, while "AURORA-512" (the output length of which is 512-bit) achieves 27.4 cycles/byte, according to performance measurements.

When implemented in hardware using a 0.13?m CMOS standard cell library, "AURORA-256" achieves a smallest gate size of just 11.1K/2.2Gbps, making it highly suitable for use in mobile devices, and a maximum throughput of 35.0Kgates/10.4 Gbps, ideal for servers. Meanwhile, "AURORA-512" achieves a smallest gate size of just 14.6K/1.2Gbps and maximum throughput of 56.7gates/9.1 Gbps.

Sony claims that even when compared against key hash functions such as SHA-2 - a cryptographic hash algorithm developed by NIST based on the SHA-1 - the "AURORA" range is able to deliver highly secure hash functions across a wide range of implementations, without loss of performance on many types of platforms.

NIST invited entries to a competition for the selection of next generation secure hash functions with output lengths of 224-bit, 256-bit, 384-bit and 512-bits, and "AURORA" has been approved as an official candidate for this competition. Going forward, technological aspects of "AURORA" such as security and performance will be evaluated and compared under the same conditions as other selected candidates. NIST has accepted 51 candidate algorithms as "proper and complete" among the 64 submitted for the SHA-3 contest. All of them will be compared and evaluated under equal conditions. After this public evaluation process, in 2012 NIST will select the most suitable algorithm or algorithms as new algorithm standards, to be known as "SHA-3".


Previous
Next
Latest Blu-ray BD+ Protection Cannot be Circumvented        All News        Samsung?s New Media Processor Brings Multimedia Capabilities to Digital Photo Frames
SanDisk and Toshiba to Cut Production of NAND Memory at Facilities in Japan     Consumer Electronics News      Wireless HDTV Products Still Limited in North America

Get RSS feed Easy Print E-Mail this Message

Related News
Sony's DPT-CP1 Paper E Ink Tablet Coming Early June
Sony's Xperia XZ2 Premium Brings Ultra-high Sensitivity Dual Camera, 4K HDR Movie Recording and Display
New Sony a7 III 24MP Full Frame Mirrorless Camera Retails For Less Than $2,000
Sony's New Xperia XZ2 Supports 4K HDR Video Recording
Sony to Build Taxi-hailing System
New Sony Back-Illuminated CMOS Image Sensor Enables Global Shutter Function
Sony Announces Pricing for X900F and X850F Series 4K HDR Ultra HD TVs
Music and TV Sales Fuel Sony's Record Third Quarter Profit, Hirai to Step Down
Sony to Showcase New Creative and Technological Concepts at SXSW 2018
CES: Sony Presents New OLED TVs, Audio Products, Robot Car Image Sensors
Sony Unveils new Selfie Xperia XA2 and Xperia XA2 Ultra Smartphones
Sony Revives the AIBO Robot Dog

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2018 - All rights reserved -
Privacy policy - Contact Us .