Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications

被引:0
|
作者
Ignatius, Titu Mary [1 ]
Singha, Thockchom Birjit [1 ]
Palathinkal, Roy Paily [1 ]
机构
[1] IIT Guwahati, Dept Elect & Elect Engn, Gauhati 781039, India
来源
IEEE ACCESS | 2024年 / 12卷
关键词
IoTe devices; RISC-V; DBP; PC; IF stage; ID stage; IE stage; RW stage; AES; SCA; PAA; CPA; HD; HW; SubBytes; ShiftRows; MixColumns; AddRoundKey; MTD; SNR; TVLA; MI;
D O I
10.1109/ACCESS.2024.3477961
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the advancement of IoT edge devices, the threat to sensitive data processed at these devices is increasing. This research aims to enhance processor's built-in resilience against power analysis attacks (PAA) by expanding pipeline stages, employing diverse pipeline techniques, and integrating additional features. The paper proposes 32-bit RISC-V core micro-architectures with inbuilt cryptographic capabilities, extending the RISC-V ISA with custom AES instructions to reduce energy consumption, code size, and encryption time compared to software AES solutions. An area-efficient 128-bit, 12-clock AES based on the Masoleh S-box is integrated into the RISC-V core, resulting in low area and power overheads. Two cores are presented: Core1, a 3-stage pipelined core with a software pause, and Core2, a 4-stage pipelined core with a hardware pause for securing data with AES instructions. Despite their vulnerabilities, the integration of AES with RISC-V architecture significantly improves their intrinsic resilience against PAA. This work analyses the vulnerability and improvement in intrinsic resilience of these cores to side-channel attacks, the impact of hardware versus software pause and the effect of pipeline stages on security metrics. The proposed designs are validated on a Xilinx Basys3 FPGA and developed in UMC 65 nm technology node. Power traces generated during AES encryption are extracted using Synopsys PrimeTime PX and analyzed with a MATLAB power attack model to successfully recover all key bytes. Core1 and Core2 achieved higher throughput of 2.02x2.83x, respectively, than the Arm CryptoCell312. Core2's added circuits for hardware pause and increased number of pipeline stages significantly boost performance and enhance security against power attacks, with only a modest increase in area and power consumption.
引用
收藏
页码:150230 / 150248
页数:19
相关论文
共 50 条
  • [1] INVITED: Protecting RISC-V against Side-Channel Attacks
    De Mulder, Elke
    Gummalla, Samatha
    Hutter, Michael
    PROCEEDINGS OF THE 2019 56TH ACM/EDAC/IEEE DESIGN AUTOMATION CONFERENCE (DAC), 2019,
  • [2] SAluMC: Thwarting Side-Channel Attacks via Random Number Injection in RISC-V
    Dang, Shibo
    Shao, Yunlong
    Li, Zhida
    Makanju, Adetokunbo
    Gulliver, Thomas Aaron
    ENTROPY, 2025, 27 (02)
  • [3] A High-Performance Core Micro-Architecture Based on RISC-V ISA for Low Power Applications
    Bora, Satyajit
    Paily, Roy
    IEEE TRANSACTIONS ON CIRCUITS AND SYSTEMS II-EXPRESS BRIEFS, 2021, 68 (06) : 2132 - 2136
  • [4] MAMBO-V: Dynamic Side-Channel Leakage Analysis on RISC-V
    Wichelmann, Jan
    Peredy, Christopher
    Sieck, Florian
    Paetschke, Anna
    Eisenbarth, Thomas
    DETECTION OF INTRUSIONS AND MALWARE, AND VULNERABILITY ASSESSMENT, DIMVA 2023, 2023, 13959 : 3 - 23
  • [5] Development of a Power Electronics Controller with RISC-V based Core for Security-Critical Applications
    Swakath, S. U.
    Kshirsagar, Abhijit
    Kondepu, Koteswararao
    Banavath, Satish Naik
    Chub, Andrii
    Vinnikov, Dmitri
    2022 IEEE 63TH INTERNATIONAL SCIENTIFIC CONFERENCE ON POWER AND ELECTRICAL ENGINEERING OF RIGA TECHNICAL UNIVERSITY (RTUCON), 2022,
  • [6] A combined side-channel and transient execution attack scheme on RISC-V processors
    Dong, Renhai
    Cui, Baojiang
    Sun, Yi
    Yang, Jun
    COMPUTERS & SECURITY, 2025, 150
  • [7] Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version
    Tamon Asano
    Takeshi Sugawara
    Journal of Cryptographic Engineering, 2024, 14 : 165 - 180
  • [8] DuckCore: A Fault-Tolerant Processor Core Architecture Based on the RISC-V ISA
    Li, Jiemin
    Zhang, Shancong
    Bao, Chong
    ELECTRONICS, 2022, 11 (01)
  • [9] Simulation-based evaluation of bit-interaction side-channel leakage on RISC-V: extended version
    Asano, Tamon
    Sugawara, Takeshi
    JOURNAL OF CRYPTOGRAPHIC ENGINEERING, 2024, 14 (01) : 165 - 180
  • [10] Security Verification of RISC-V System Based on ISA Level Information Flow Tracking
    Wu, Lingjuan
    Gao, Yifei
    Zhu, Jiacheng
    Tai, Yu
    Hu, Wei
    2023 IEEE 32ND ASIAN TEST SYMPOSIUM, ATS, 2023, : 195 - 200