Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications

With the advancement of IoT edge devices, the threat to sensitive data processed at these devices is increasing. This research aims to enhance processor’s built-in resilience against power analysis attacks (PAA) by expanding pipeline stages, employing diverse pipeline techniques, and inte...

Full description

Saved in:
Bibliographic Details
Main Authors: Titu Mary Ignatius, Thockchom Birjit Singha, Roy Paily Palathinkal
Format: Article
Language:English
Published: IEEE 2024-01-01
Series:IEEE Access
Subjects:
Online Access:https://ieeexplore.ieee.org/document/10713320/
Tags: Add Tag
No Tags, Be the first to tag this record!
_version_ 1850283108033626112
author Titu Mary Ignatius
Thockchom Birjit Singha
Roy Paily Palathinkal
author_facet Titu Mary Ignatius
Thockchom Birjit Singha
Roy Paily Palathinkal
author_sort Titu Mary Ignatius
collection DOAJ
description With the advancement of IoT edge devices, the threat to sensitive data processed at these devices is increasing. This research aims to enhance processor&#x2019;s built-in resilience against power analysis attacks (PAA) by expanding pipeline stages, employing diverse pipeline techniques, and integrating additional features. The paper proposes 32-bit RISC-V core micro-architectures with inbuilt cryptographic capabilities, extending the RISC-V ISA with custom AES instructions to reduce energy consumption, code size, and encryption time compared to software AES solutions. An area-efficient 128-bit, 12-clock AES based on the Masoleh S-box is integrated into the RISC-V core, resulting in low area and power overheads. Two cores are presented: Core1, a 3-stage pipelined core with a software pause, and Core2, a 4-stage pipelined core with a hardware pause for securing data with AES instructions. Despite their vulnerabilities, the integration of AES with RISC-V architecture significantly improves their intrinsic resilience against PAA. This work analyses the vulnerability and improvement in intrinsic resilience of these cores to side-channel attacks, the impact of hardware versus software pause and the effect of pipeline stages on security metrics. The proposed designs are validated on a Xilinx Basys3 FPGA and developed in UMC 65 nm technology node. Power traces generated during AES encryption are extracted using Synopsys PrimeTime PX and analyzed with a MATLAB power attack model to successfully recover all key bytes. Core1 and Core2 achieved higher throughput of <inline-formula> <tex-math notation="LaTeX">$2.02\times $ </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">$2.83\times $ </tex-math></inline-formula>, respectively, than the Arm CryptoCell312. Core2&#x2019;s added circuits for hardware pause and increased number of pipeline stages significantly boost performance and enhance security against power attacks, with only a modest increase in area and power consumption.
format Article
id doaj-art-6308815fdcb248c8a600a99e7eca0ef6
institution OA Journals
issn 2169-3536
language English
publishDate 2024-01-01
publisher IEEE
record_format Article
series IEEE Access
spelling doaj-art-6308815fdcb248c8a600a99e7eca0ef62025-08-20T01:47:50ZengIEEEIEEE Access2169-35362024-01-011215023015024810.1109/ACCESS.2024.347796110713320Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security ApplicationsTitu Mary Ignatius0https://orcid.org/0000-0001-7794-653XThockchom Birjit Singha1https://orcid.org/0000-0003-0271-4202Roy Paily Palathinkal2https://orcid.org/0000-0003-3004-9369Department of Electronics and Electrical Engineering, Indian Institute of Technology (IIT) Guwahati, Guwahati, IndiaDepartment of Electronics and Electrical Engineering, Indian Institute of Technology (IIT) Guwahati, Guwahati, IndiaDepartment of Electronics and Electrical Engineering, Indian Institute of Technology (IIT) Guwahati, Guwahati, IndiaWith the advancement of IoT edge devices, the threat to sensitive data processed at these devices is increasing. This research aims to enhance processor&#x2019;s built-in resilience against power analysis attacks (PAA) by expanding pipeline stages, employing diverse pipeline techniques, and integrating additional features. The paper proposes 32-bit RISC-V core micro-architectures with inbuilt cryptographic capabilities, extending the RISC-V ISA with custom AES instructions to reduce energy consumption, code size, and encryption time compared to software AES solutions. An area-efficient 128-bit, 12-clock AES based on the Masoleh S-box is integrated into the RISC-V core, resulting in low area and power overheads. Two cores are presented: Core1, a 3-stage pipelined core with a software pause, and Core2, a 4-stage pipelined core with a hardware pause for securing data with AES instructions. Despite their vulnerabilities, the integration of AES with RISC-V architecture significantly improves their intrinsic resilience against PAA. This work analyses the vulnerability and improvement in intrinsic resilience of these cores to side-channel attacks, the impact of hardware versus software pause and the effect of pipeline stages on security metrics. The proposed designs are validated on a Xilinx Basys3 FPGA and developed in UMC 65 nm technology node. Power traces generated during AES encryption are extracted using Synopsys PrimeTime PX and analyzed with a MATLAB power attack model to successfully recover all key bytes. Core1 and Core2 achieved higher throughput of <inline-formula> <tex-math notation="LaTeX">$2.02\times $ </tex-math></inline-formula> and <inline-formula> <tex-math notation="LaTeX">$2.83\times $ </tex-math></inline-formula>, respectively, than the Arm CryptoCell312. Core2&#x2019;s added circuits for hardware pause and increased number of pipeline stages significantly boost performance and enhance security against power attacks, with only a modest increase in area and power consumption.https://ieeexplore.ieee.org/document/10713320/IoTe devicesRISC-VDBPPCIF stageID stage
spellingShingle Titu Mary Ignatius
Thockchom Birjit Singha
Roy Paily Palathinkal
Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications
IEEE Access
IoTe devices
RISC-V
DBP
PC
IF stage
ID stage
title Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications
title_full Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications
title_fullStr Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications
title_full_unstemmed Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications
title_short Power Side-Channel Attacks on Crypto-Core Based on RISC-V ISA for High-Security Applications
title_sort power side channel attacks on crypto core based on risc v isa for high security applications
topic IoTe devices
RISC-V
DBP
PC
IF stage
ID stage
url https://ieeexplore.ieee.org/document/10713320/
work_keys_str_mv AT titumaryignatius powersidechannelattacksoncryptocorebasedonriscvisaforhighsecurityapplications
AT thockchombirjitsingha powersidechannelattacksoncryptocorebasedonriscvisaforhighsecurityapplications
AT roypailypalathinkal powersidechannelattacksoncryptocorebasedonriscvisaforhighsecurityapplications