Modified SHA-3 Side-Channel using Yarrow-Based Random Delay on Secure Communication
Keywords:
SHA3, Side-Channel, Yarrow, Pseudorandom Number Generator, Random Delay, Performance, Cryptography.Abstract
Secure Hash Algorithm-3 or SHA3 is a hashing algorithm that, when not appropriately implemented, can exhibit vulnerabilities to side-channel attacks. One type of this attack is a timing analysis attack. It utilizes timing information gained to obtain the key required for the algorithm. In this study, the researchers proposed a Random Delay implementation with a CSPRNG, specifically Yarrow CSPRNG, as its number generator, thus creating high-quality randomness that is highly secured from side-channel attacks, unique timings, and exhibits less predictability. Statistical tests such as the Avalanche Test evaluated the algorithm’s performance. The test yielded 51.18 percent, and the performance analysis regarding CPU Load and Memory Usage is not far from a standard implementation of SHA3 and a standard implementation of SHA3 with Random Delay. The results proved that the proposed performance is cryptographically secure and efficient, as all tests yielded favorable results.
Downloads
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2023 Ronald Christian C. Fausto III, Marion Cedric Emanuel V. Tapang, Dan Michael Cortez
This work is licensed under a Creative Commons Attribution-NonCommercial 4.0 International License.