What is it about?
Side channel attacks with their diverse categories, such as timing, fault and power analysis attacks, impose us to reconsider new strategies in implementing a hashing method based on SHA3-512 hashing algorithm that can counteract the side-channel attacks.
Featured Image
Why is it important?
We propose an enhanced SHA3-512-based hashing algorithm. The enhancements are based on shuffling the input arrays using Fisher Yates algorithm as well as applying volatile objects and thread locking techniques. The proposed method passes all NIST tests and is proved to be more secure than other related methods.
Read the Original
This page is a summary of: An Enhanced SHA3-based Hashing Method, April 2019, ACM (Association for Computing Machinery),
DOI: 10.1145/3328833.3328879.
You can read the full text:
Contributors
The following have contributed to this page