AURORA

From The ECRYPT Hash Function Website

Jump to: navigation, search

1 The algorithm


Tetsu Iwata, Kyoji Shibutani, Taizo Shirai, Shiho Moriai, Toru Akishita - AURORA: A Cryptographic Hash Algorithm Family
Submission to NIST, 2008
[Electronic Edition] [Bibtex]
Author : Tetsu Iwata, Kyoji Shibutani, Taizo Shirai, Shiho Moriai, Toru Akishita
Title : AURORA: A Cryptographic Hash Algorithm Family
In : Submission to NIST -


2 Cryptanalysis

Type of Analysis Hash Function Part Hash Size (n) Parameters/Variants Compression Function Calls Memory Requirements Reference
2nd preimage hash 512 2291 231.5 Ferguson, Lucks
collision hash 512 2249 - Ferguson, Lucks
collision hash 512 2234.5 2229.6 Ferguson, Lucks
2nd preimage hash 512 2291 2288 Sasaki
collision hash 512 2236 2236 Sasaki
key-recovery HMAC 512 2259 - Sasaki

A description of this table is given here.


Niels Ferguson, Stefan Lucks - Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform
Cryptology ePrint Archive, Report 2009/113, 2009
[Electronic Edition] [Bibtex]
Author : Niels Ferguson, Stefan Lucks
Title : Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform
In : Cryptology ePrint Archive, Report 2009/113 -
[Abstract]

Yu Sasaki - A 2nd-Preimage Attack on AURORA-512
Cryptology ePrint Archive, Report 2009/112, 2009
[Electronic Edition] [Bibtex]
Author : Yu Sasaki
Title : A 2nd-Preimage Attack on AURORA-512
In : Cryptology ePrint Archive, Report 2009/112 -
[Abstract]

Yu Sasaki - A Collision Attack on AURORA-512
Cryptology ePrint Archive, Report 2009/106, 2009
[Electronic Edition] [Bibtex]
Author : Yu Sasaki
Title : A Collision Attack on AURORA-512
In : Cryptology ePrint Archive, Report 2009/106 -
[Abstract]

Yu Sasaki - A Full Key Recovery Attack on HMAC-AURORA-512
Cryptology ePrint Archive, Report 2009/125, 2009
[Bibtex]
Author : Yu Sasaki
Title : A Full Key Recovery Attack on HMAC-AURORA-512
In : Cryptology ePrint Archive, Report 2009/125 -
[Abstract]
Personal tools