Welcome to the resource topic for 2010/304
Title:
Cryptanalysis of the Compression Function of SIMD
Authors: Hongbo Yu, Xiaoyun Wang
Abstract:SIMD is one of the second round candidates of the SHA-3 competition hosted by NIST. In this paper, we present some results on the compression function of SIMD 1.1 (the tweaked version) using the modular difference method. For SIMD-256, We give a free-start near collision attack on the compression function reduced to 20 steps with complexity 2^{-107}. And for SIMD-512, we give a free-start near collision attack on the 24-step compression function with complexity 2^{208}. Furthermore, we give a distinguisher attack on the full compression function of SIMD-512 with complexity 2^{398}. Our attacks are also applicable for the final compression function of SIMD.
ePrint: https://eprint.iacr.org/2010/304
See all topics related to this paper.
Feel free to post resources that are related to this paper below.
Example resources include: implementations, explanation materials, talks, slides, links to previous discussions on other websites.
For more information, see the rules for Resource Topics .