Friday, November 27, 2015
Submit your own News for
inclusion in our Site.
Click here...
Breaking News
NSA's Phone Surveillance Program Changes
Lenovo and Razer Partner to Make Gaming PCs
LG Display Makes Huge Investment in OLED Panels
Sony To Bring Remote Play Feature To PS4
MINIX NEO U1 Media Hub for Android Coming Next Week
Samsung Joins Audi’s Progressive SemiConductor Program
German ISPs May Block Music-sharing Sites: court
Study Says HTTPS Certificate and SSH Key Reuse Endangers Millions of Devices Worldwide
Active Discussions
How to back up a PS2 DL game
Copy a protected DVD?
roxio issues with xp pro
How to burn a backup copy of The Frozen Throne
Help make DVDInfoPro better with dvdinfomantis!!!
Copied dvd's say blank in computer only
menu making
Optiarc AD-7260S review
 Home > News > Consumer Electronics > Sony De...
Last 7 Days News : SU MO TU WE TH FR SA All News

Monday, December 15, 2008
Sony Develops Next Generation Cryptographic Hash Algorithm

Sony has developed a new secur

Called "AURORA", the hash algorithm maintains high security levels while providing both efficient software and hardware implementation capabilities, according to Sony. Sony and Nagoya University have submitted "AURORA" for consideration in the "SHA-3 competition", a selection process for next generation cryptographic hash functions overseen by the National Institute of Standards and Technology (NIST).

In recent years, the rapid advancement of cryptanalytic technologies such as SHA-1 and MD5, capable of deciphering cryptographic hash functions, have increased the requirement for new types of hash functions that feature the properties to withstand this progress. SHA-1 is a cryptographic hash algorithm developed by NIST, contained in the FIPS 180-2 standard. SHA-1 is well-known and widely used in many secure systems. MD5 is also a cryptographic hash function that had been widely used before the development of SHA-1. Recently, the vulnerability of both algorithms has been highlighted.

"AURORA" is a highly efficient cryptographic hash algorithm uses Sony's expertise accumulated thought the development of its secure and efficient block cipher, "CLEFIA?" developed by Sony in 2007. "AURORA" is designed to combine secure compression functions and advanced domain extension capabilities, with it's compression functions achieving advanced levels of security by connecting multiple functions to offer a broad mix of data. Furthermore, "AURORA" is suitable for use in various types of applications due to its repetitive structure and byte-oriented component design. "AURORA"'s domain extensions effectively connect underlying compression functions to each other to extend the applicable length of input messages and output values, realizing security levels capable of withstanding many cryptanalytic techniques.

When implemented in software, "AURORA-256" (the output length of which is 256-bit) achieves fastest speeds of 15.4 cycles/byte, while "AURORA-512" (the output length of which is 512-bit) achieves 27.4 cycles/byte, according to performance measurements.

When implemented in hardware using a 0.13?m CMOS standard cell library, "AURORA-256" achieves a smallest gate size of just 11.1K/2.2Gbps, making it highly suitable for use in mobile devices, and a maximum throughput of 35.0Kgates/10.4 Gbps, ideal for servers. Meanwhile, "AURORA-512" achieves a smallest gate size of just 14.6K/1.2Gbps and maximum throughput of 56.7gates/9.1 Gbps.

Sony claims that even when compared against key hash functions such as SHA-2 - a cryptographic hash algorithm developed by NIST based on the SHA-1 - the "AURORA" range is able to deliver highly secure hash functions across a wide range of implementations, without loss of performance on many types of platforms.

NIST invited entries to a competition for the selection of next generation secure hash functions with output lengths of 224-bit, 256-bit, 384-bit and 512-bits, and "AURORA" has been approved as an official candidate for this competition. Going forward, technological aspects of "AURORA" such as security and performance will be evaluated and compared under the same conditions as other selected candidates. NIST has accepted 51 candidate algorithms as "proper and complete" among the 64 submitted for the SHA-3 contest. All of them will be compared and evaluated under equal conditions. After this public evaluation process, in 2012 NIST will select the most suitable algorithm or algorithms as new algorithm standards, to be known as "SHA-3".

Latest Blu-ray BD+ Protection Cannot be Circumvented        All News        Samsung?s New Media Processor Brings Multimedia Capabilities to Digital Photo Frames
SanDisk and Toshiba to Cut Production of NAND Memory at Facilities in Japan     Consumer Electronics News      Wireless HDTV Products Still Limited in North America

Get RSS feed Easy Print E-Mail this Message

Related News
Sony CEO dismisses Chip Development Rumors
Sony a68 A-mount Camera Shipping With 4D FOCUS
Sony Returns To profitablity Following Strong PS4 Sales
Toshiba To Sell Image Sensor Business to Sony
Sony Introduces 4K Home Theater Projectors, ES Receiver at CEDIA 2015
Sony RX1R II Camera Packs A 42MP Back-Illuminated Full-Frame Image Sensor
Sony Acquires Softkinetic Systems To Expand Its Image Sensor Offerings
Sony Semiconductor Solutions Corporation Established
New Sony Software Upgrade, Rolls For Xperia M2 and Xperia M2 Aqua
Sony Brings Hi-Res Audio to the Car
Sony Adds Uncompressed 14-Bit RAW Still Image Capture for New α Cameras
Sony Launches The Ultra-sensitive a7S II Full-frame Camera

Most Popular News
Home | News | All News | Reviews | Articles | Guides | Download | Expert Area | Forum | Site Info
Site best viewed at 1024x768+ - CDRINFO.COM 1998-2015 - All rights reserved -
Privacy policy - Contact Us .