International Association for Cryptologic Research (IACR)
Abstract
SIMD is one of the second round candidates of the SHA-3 competition
hosted by NIST. In this paper, we present some results on the
compression function of SIMD 1.1 (the tweaked version) using the
modular difference method. For SIMD-256, We give a free-start near
collision attack on the compression function reduced to 20 steps
with complexity 2β107. And for SIMD-512, we give a free-start
near collision attack on the 24-step compression function with
complexity 2208. Furthermore, we give a distinguisher attack on
the full compression function of SIMD-512 with complexity 2398.
Our attacks are also applicable for the final compression function
of SIMD