SONY

menu
Search button in the site

Open the search area of the site??

AURORA A Cryptographic Hash Algorithm Family

  • Home
  • Download
  • Analysis
  • Implementations
  • Bibliography
  • Links
  • History

Analysis

Publicly available analytic results on security of AURORA family are summarized here.

External Evaluations

Following analysis results are reported.
N. Ferguson and Stefan Lucks, “Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard transform,” IACR ePrint archive 2009/113, 2009
Y. Sasaki, “A 2nd-preimage attack on AURORA-512,” IACR ePrint archive 2009/112, 2009
Y. Sasaki, “A collision attack on AURORA-512,” IACR ePrint archive 2009/106, 2009
Y. Sasaki, “A full key recovery attack on HMAC-AURORA-512,” IACR ePrint archive 2009/125, 2009