CryptoDB
Cryptanalysis of the Compression Function of SIMD
Authors: | |
---|---|
Download: | |
Abstract: | SIMD is one of the second round candidates of the SHA-3 competition hosted by NIST. In this paper, we present some results on the compression function of SIMD 1.1 (the tweaked version) using the modular difference method. For SIMD-256, We give a free-start near collision attack on the compression function reduced to 20 steps with complexity $2^{-107}$. And for SIMD-512, we give a free-start near collision attack on the 24-step compression function with complexity $2^{208}$. Furthermore, we give a distinguisher attack on the full compression function of SIMD-512 with complexity $2^{398}$. Our attacks are also applicable for the final compression function of SIMD. |
BibTeX
@misc{eprint-2010-23205, title={Cryptanalysis of the Compression Function of SIMD}, booktitle={IACR Eprint archive}, keywords={secret-key cryptography /}, url={http://eprint.iacr.org/2010/304}, note={ yuhongbo@mail.tsinghua.edu.cn 14749 received 20 May 2010}, author={Hongbo Yu and Xiaoyun Wang}, year=2010 }