AURORA
From The ECRYPT Hash Function Website
1 The algorithm
- Author(s): Tetsu Iwata, Kyoji Shibutani, Taizo Shirai, Shiho Moriai, Toru Akishita
- Website: http://www.sony.net/aurora/
- NIST submission package: AURORA.zip
Tetsu Iwata, Kyoji Shibutani, Taizo Shirai, Shiho Moriai, Toru Akishita - AURORA: A Cryptographic Hash Algorithm Family
- ,2008
- http://ehash.iaik.tugraz.at/uploads/b/ba/AURORA.pdf
BibtexAuthor : Tetsu Iwata, Kyoji Shibutani, Taizo Shirai, Shiho Moriai, Toru Akishita
Title : AURORA: A Cryptographic Hash Algorithm Family
In : -
Address :
Date : 2008
2 Cryptanalysis
Type of Analysis | Hash Function Part | Hash Size (n) | Parameters/Variants | Compression Function Calls | Memory Requirements | Reference |
2nd preimage | hash | 512 | 2291 | 231.5 | Ferguson, Lucks | |
collision | hash | 512 | 2249 | - | Ferguson, Lucks | |
collision | hash | 512 | 2234.5 | 2229.6 | Ferguson, Lucks | |
2nd preimage | hash | 512 | 2291 | 2288 | Sasaki | |
collision | hash | 512 | 2236 | 2236 | Sasaki | |
key-recovery | HMAC | 512 | 2259 | - | Sasaki |
A description of this table is given here.
Niels Ferguson, Stefan Lucks - Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform
- ,2009
- http://eprint.iacr.org/2009/113.pdf
BibtexAuthor : Niels Ferguson, Stefan Lucks
Title : Attacks on AURORA-512 and the Double-Mix Merkle-Damgaard Transform
In : -
Address :
Date : 2009
Yu Sasaki - A 2nd-Preimage Attack on AURORA-512
- ,2009
- http://eprint.iacr.org/2009/112.pdf
BibtexAuthor : Yu Sasaki
Title : A 2nd-Preimage Attack on AURORA-512
In : -
Address :
Date : 2009
Yu Sasaki - A Collision Attack on AURORA-512
- ,2009
- http://eprint.iacr.org/2009/106.pdf
BibtexAuthor : Yu Sasaki
Title : A Collision Attack on AURORA-512
In : -
Address :
Date : 2009
Yu Sasaki - A Full Key Recovery Attack on HMAC-AURORA-512