Cryptanalysis of the Compression Function of SIMD

Abstract

SIMD is one of the second round candidates of the SHA-3 competition hosted by NIST. In this paper, we present some results on the compression function of SIMD 1.1 (the tweaked version) using the modular difference method. For SIMD-256, We give a free-start near collision attack on the compression function reduced to 20 steps with complexity 2βˆ’1072^{-107}. And for SIMD-512, we give a free-start near collision attack on the 24-step compression function with complexity 22082^{208}. Furthermore, we give a distinguisher attack on the full compression function of SIMD-512 with complexity 23982^{398}. Our attacks are also applicable for the final compression function of SIMD

    Similar works