Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications
With the advancement of IoT edge devices, the threat to sensitive data processed at these devices is increasing. This research aims to enhance processor’s built-in resilience against power analysis attacks (PAA) by expanding pipeline stages, employing diverse pipeline techniques, and inte...
Saved in:
| Main Authors: | , , |
|---|---|
| Format: | Article |
| Language: | English |
| Published: |
IEEE
2024-01-01
|
| Series: | IEEE Access |
| Subjects: | |
| Online Access: | https://ieeexplore.ieee.org/document/10713320/ |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
| _version_ | 1850283108033626112 |
|---|---|
| author | Titu Mary Ignatius Thockchom Birjit Singha Roy Paily Palathinkal |
| author_facet | Titu Mary Ignatius Thockchom Birjit Singha Roy Paily Palathinkal |
| author_sort | Titu Mary Ignatius |
| collection | DOAJ |
| description | With the advancement of IoT edge devices, the threat to sensitive data processed at these devices is increasing. This research aims to enhance processor’s built-in resilience against power analysis attacks (PAA) by expanding pipeline stages, employing diverse pipeline techniques, and integrating additional features. The paper proposes 32-bit RISC-V core micro-architectures with inbuilt cryptographic capabilities, extending the RISC-V ISA with custom AES instructions to reduce energy consumption, code size, and encryption time compared to software AES solutions. An area-efficient 128-bit, 12-clock AES based on the Masoleh S-box is integrated into the RISC-V core, resulting in low area and power overheads. Two cores are presented: Core1, a 3-stage pipelined core with a software pause, and Core2, a 4-stage pipelined core with a hardware pause for securing data with AES instructions. Despite their vulnerabilities, the integration of AES with RISC-V architecture significantly improves their intrinsic resilience against PAA. This work analyses the vulnerability and improvement in intrinsic resilience of these cores to side-channel attacks, the impact of hardware versus software pause and the effect of pipeline stages on security metrics. The proposed designs are validated on a Xilinx Basys3 FPGA and developed in UMC 65 nm technology node. Power traces generated during AES encryption are extracted using Synopsys PrimeTime PX and analyzed with a MATLAB power attack model to successfully recover all key bytes. Core1 and Core2 achieved higher throughput of <inline-formula> <tex-math notation="LaTeX">$2.02\times $ </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">$2.83\times $ </tex-math></inline-formula>, respectively, than the Arm CryptoCell312. Core2’s added circuits for hardware pause and increased number of pipeline stages significantly boost performance and enhance security against power attacks, with only a modest increase in area and power consumption. |
| format | Article |
| id | doaj-art-6308815fdcb248c8a600a99e7eca0ef6 |
| institution | OA Journals |
| issn | 2169-3536 |
| language | English |
| publishDate | 2024-01-01 |
| publisher | IEEE |
| record_format | Article |
| series | IEEE Access |
| spelling | doaj-art-6308815fdcb248c8a600a99e7eca0ef62025-08-20T01:47:50ZengIEEEIEEE Access2169-35362024-01-011215023015024810.1109/ACCESS.2024.347796110713320Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security ApplicationsTitu Mary Ignatius0https://orcid.org/0000-0001-7794-653XThockchom Birjit Singha1https://orcid.org/0000-0003-0271-4202Roy Paily Palathinkal2https://orcid.org/0000-0003-3004-9369Department of Electronics and Electrical Engineering, Indian Institute of Technology (IIT) Guwahati, Guwahati, IndiaDepartment of Electronics and Electrical Engineering, Indian Institute of Technology (IIT) Guwahati, Guwahati, IndiaDepartment of Electronics and Electrical Engineering, Indian Institute of Technology (IIT) Guwahati, Guwahati, IndiaWith the advancement of IoT edge devices, the threat to sensitive data processed at these devices is increasing. This research aims to enhance processor’s built-in resilience against power analysis attacks (PAA) by expanding pipeline stages, employing diverse pipeline techniques, and integrating additional features. The paper proposes 32-bit RISC-V core micro-architectures with inbuilt cryptographic capabilities, extending the RISC-V ISA with custom AES instructions to reduce energy consumption, code size, and encryption time compared to software AES solutions. An area-efficient 128-bit, 12-clock AES based on the Masoleh S-box is integrated into the RISC-V core, resulting in low area and power overheads. Two cores are presented: Core1, a 3-stage pipelined core with a software pause, and Core2, a 4-stage pipelined core with a hardware pause for securing data with AES instructions. Despite their vulnerabilities, the integration of AES with RISC-V architecture significantly improves their intrinsic resilience against PAA. This work analyses the vulnerability and improvement in intrinsic resilience of these cores to side-channel attacks, the impact of hardware versus software pause and the effect of pipeline stages on security metrics. The proposed designs are validated on a Xilinx Basys3 FPGA and developed in UMC 65 nm technology node. Power traces generated during AES encryption are extracted using Synopsys PrimeTime PX and analyzed with a MATLAB power attack model to successfully recover all key bytes. Core1 and Core2 achieved higher throughput of <inline-formula> <tex-math notation="LaTeX">$2.02\times $ </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">$2.83\times $ </tex-math></inline-formula>, respectively, than the Arm CryptoCell312. Core2’s added circuits for hardware pause and increased number of pipeline stages significantly boost performance and enhance security against power attacks, with only a modest increase in area and power consumption.https://ieeexplore.ieee.org/document/10713320/IoTe devicesRISC-VDBPPCIF stageID stage |
| spellingShingle | Titu Mary Ignatius Thockchom Birjit Singha Roy Paily Palathinkal Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications IEEE Access IoTe devices RISC-V DBP PC IF stage ID stage |
| title | Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications |
| title_full | Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications |
| title_fullStr | Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications |
| title_full_unstemmed | Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications |
| title_short | Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications |
| title_sort | power side channel attacks on crypto core based on risc v isa for high security applications |
| topic | IoTe devices RISC-V DBP PC IF stage ID stage |
| url | https://ieeexplore.ieee.org/document/10713320/ |
| work_keys_str_mv | AT titumaryignatius powersidechannelattacksoncryptocorebasedonriscvisaforhighsecurityapplications AT thockchombirjitsingha powersidechannelattacksoncryptocorebasedonriscvisaforhighsecurityapplications AT roypailypalathinkal powersidechannelattacksoncryptocorebasedonriscvisaforhighsecurityapplications |