[Resource Topic] 2010/304: Cryptanalysis of the Compression Function of SIMD

Welcome to the resource topic for 2010/304

Title:
Cryptanalysis of the Compression Function of SIMD

Authors: Hongbo Yu, Xiaoyun Wang

Abstract:

SIMD is one of the second round candidates of the SHA-3 competition hosted by NIST. In this paper, we present some results on the compression function of SIMD 1.1 (the tweaked version) using the modular difference method. For SIMD-256, We give a free-start near collision attack on the compression function reduced to 20 steps with complexity 2^{-107}. And for SIMD-512, we give a free-start near collision attack on the 24-step compression function with complexity 2^{208}. Furthermore, we give a distinguisher attack on the full compression function of SIMD-512 with complexity 2^{398}. Our attacks are also applicable for the final compression function of SIMD.

ePrint: https://eprint.iacr.org/2010/304

See all topics related to this paper.

Feel free to post resources that are related to this paper below.

Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.

For more information, see the rules for Resource Topics .