Sunday, September 21, 2014
Search
  
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
Microsoft Pushes Back Xbox One Debut In China
New Oculus 'Crescent Bay' Headset Announced
Microsoft Offers iPhone Users 30 GB of Free Storage
New Tizen Device Coming in India
Samsung Launches My Knox App For Latest Mobile Device
Android L To Support Encryption By Default
Microsoft Outlines Basic Elements Of Direct3D 12
New GeForce WHQL Driver Released
Active Discussions
Yamaha CRW-F1UX
help questions structure DVDR
Made video, won't play back easily
Questions durability monitor LCD
Questions fungus CD/DVD Media, Some expert engineer in optical media can help me?
CD, DVD and Blu-ray burning for Android in development
IBM supercharges Power servers with graphics chips
Werner Vogels: four cloud computing trends for 2014
 Home > News > Consumer Electronics > Sony De...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, December 15, 2008
Sony Develops Next Generation Cryptographic Hash Algorithm


Sony has developed a new secur

Called "AURORA", the hash algorithm maintains high security levels while providing both efficient software and hardware implementation capabilities, according to Sony. Sony and Nagoya University have submitted "AURORA" for consideration in the "SHA-3 competition", a selection process for next generation cryptographic hash functions overseen by the National Institute of Standards and Technology (NIST).

In recent years, the rapid advancement of cryptanalytic technologies such as SHA-1 and MD5, capable of deciphering cryptographic hash functions, have increased the requirement for new types of hash functions that feature the properties to withstand this progress. SHA-1 is a cryptographic hash algorithm developed by NIST, contained in the FIPS 180-2 standard. SHA-1 is well-known and widely used in many secure systems. MD5 is also a cryptographic hash function that had been widely used before the development of SHA-1. Recently, the vulnerability of both algorithms has been highlighted.

"AURORA" is a highly efficient cryptographic hash algorithm uses Sony's expertise accumulated thought the development of its secure and efficient block cipher, "CLEFIA?" developed by Sony in 2007. "AURORA" is designed to combine secure compression functions and advanced domain extension capabilities, with it's compression functions achieving advanced levels of security by connecting multiple functions to offer a broad mix of data. Furthermore, "AURORA" is suitable for use in various types of applications due to its repetitive structure and byte-oriented component design. "AURORA"'s domain extensions effectively connect underlying compression functions to each other to extend the applicable length of input messages and output values, realizing security levels capable of withstanding many cryptanalytic techniques.

When implemented in software, "AURORA-256" (the output length of which is 256-bit) achieves fastest speeds of 15.4 cycles/byte, while "AURORA-512" (the output length of which is 512-bit) achieves 27.4 cycles/byte, according to performance measurements.

When implemented in hardware using a 0.13?m CMOS standard cell library, "AURORA-256" achieves a smallest gate size of just 11.1K/2.2Gbps, making it highly suitable for use in mobile devices, and a maximum throughput of 35.0Kgates/10.4 Gbps, ideal for servers. Meanwhile, "AURORA-512" achieves a smallest gate size of just 14.6K/1.2Gbps and maximum throughput of 56.7gates/9.1 Gbps.

Sony claims that even when compared against key hash functions such as SHA-2 - a cryptographic hash algorithm developed by NIST based on the SHA-1 - the "AURORA" range is able to deliver highly secure hash functions across a wide range of implementations, without loss of performance on many types of platforms.

NIST invited entries to a competition for the selection of next generation secure hash functions with output lengths of 224-bit, 256-bit, 384-bit and 512-bits, and "AURORA" has been approved as an official candidate for this competition. Going forward, technological aspects of "AURORA" such as security and performance will be evaluated and compared under the same conditions as other selected candidates. NIST has accepted 51 candidate algorithms as "proper and complete" among the 64 submitted for the SHA-3 contest. All of them will be compared and evaluated under equal conditions. After this public evaluation process, in 2012 NIST will select the most suitable algorithm or algorithms as new algorithm standards, to be known as "SHA-3".


Previous
Next
Latest Blu-ray BD+ Protection Cannot be Circumvented        All News        Samsung?s New Media Processor Brings Multimedia Capabilities to Digital Photo Frames
SanDisk and Toshiba to Cut Production of NAND Memory at Facilities in Japan     Consumer Electronics News      Wireless HDTV Products Still Limited in North America

Get RSS feed Easy Print E-Mail this Message

Related News
Sony Develops SmartEyeglass, Launches SDK
Sony To Offer Unity For PlayStation To PlayStation Licensed Developers
Sony Slashes Guidance Due To Poor Smartphone Sales
Sony Smart EyeGlass Prototype Appears At IFA
New Sony Camera Shoots In The Dark
Sony Unveils New Xperia Z3, Z3 Compact And More at IFA
Sony PSN Back Online
Sony Offers New Smart Tennis Sensor
Sony Debuts Ultra-Compact a5100 Interchangeable Lens Camera
Sony, Huawei, Microsoft To Announce New Smartphones at 2014 IFA
Sony And Best Buy To Jointly Boost 4K Content
Sony Bravia S90 TV With Curved Screen Coming In Europe

Most Popular News
 
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2014 - All rights reserved -
Privacy policy - Contact Us .