Modified SHA-3 Side-Channel using Yarrow-Based Random Delay on Secure Communication

Authors

  • Ronald Christian C. Fausto III
  • Marion Cedric Emanuel V. Tapang
  • Dan Michael Cortez

Keywords:

SHA3, Side-Channel, Yarrow, Pseudorandom Number Generator, Random Delay, Performance, Cryptography.

Abstract

Secure Hash Algorithm-3 or SHA3 is a hashing algorithm that, when not appropriately implemented, can exhibit vulnerabilities to side-channel attacks. One type of this attack is a timing analysis attack. It utilizes timing information gained to obtain the key required for the algorithm. In this study, the researchers proposed a Random Delay implementation with a CSPRNG, specifically Yarrow CSPRNG, as its number generator, thus creating high-quality randomness that is highly secured from side-channel attacks, unique timings, and exhibits less predictability. Statistical tests such as the Avalanche Test evaluated the algorithm’s performance. The test yielded 51.18 percent, and the performance analysis regarding CPU Load and Memory Usage is not far from a standard implementation of SHA3 and a standard implementation of SHA3 with Random Delay. The results proved that the proposed performance is cryptographically secure and efficient, as all tests yielded favorable results.

Downloads

Download data is not yet available.

Downloads

Published

2023-06-18

How to Cite

Ronald Christian C. Fausto III, Marion Cedric Emanuel V. Tapang, & Dan Michael Cortez. (2023). Modified SHA-3 Side-Channel using Yarrow-Based Random Delay on Secure Communication. International Journal of Progressive Research in Science and Engineering, 4(6), 162–170. Retrieved from https://journal.ijprse.com/index.php/ijprse/article/view/907

Issue

Section

Articles

Most read articles by the same author(s)