Design and Implementation of a Secure RISC-V Microprocessor

05/10/2022
by   Kleber Stangherlin, et al.
0

Secret keys can be extracted from the power consumption or electromagnetic emanations of unprotected devices. Traditional counter-measures have limited scope of protection, and impose several restrictions on how sensitive data must be manipulated. We demonstrate a bit-serial RISC-V microprocessor implementation with no plain-text data. All values are protected using Boolean masking. Software can run with little to no counter-measures, reducing code size and performance overheads. Unlike previous literature, our methodology is fully automated and can be applied to designs of arbitrary size or complexity. We also provide details on other key components such as clock randomizer, memory protection, and random number generator. The microprocessor was implemented in 65 nm CMOS technology. Its implementation was evaluated using NIST tests as well as side channel attacks. Random numbers generated with our RNG pass on all NIST tests. Side-channel analysis on the baseline implementation extracted the AES key using only 375 traces, while our secure microprocessor was able to withstand attacks using 20 M traces.

READ FULL TEXT

page 1

page 2

page 4

page 5

page 7

page 8

page 9

page 10

research
07/18/2023

On Borrowed Time – Preventing Static Power Side-Channel Analysis

In recent years, static power side-channel analysis attacks have emerged...
research
03/13/2022

Power-Based Side-Channel Attack for AES Key Extraction on the ATMega328 Microcontroller

We demonstrate the extraction of an AES secret key from flash memory on ...
research
12/04/2021

Fast and Secure Key Generation with Channel Obfuscation in Slowly Varying Environments

The physical-layer secret key generation has emerged as a promising solu...
research
11/20/2019

PARAM: A Microprocessor Hardened for Power Side-Channel Attack Resistance

The power consumption of a microprocessor is a huge channel for informat...
research
07/27/2022

Balanced Encoding of Near-Zero Correlation for an AES Implementation

Power consumption of a circuit can be exploited to recover the secret ke...
research
07/22/2022

Secure and Lightweight Strong PUF Challenge Obfuscation with Keyed Non-linear FSR

We propose a secure and lightweight key based challenge obfuscation for ...
research
04/14/2022

On Random Number Generation for Kernel Applications

An operating system kernel uses cryptographically secure pseudorandom nu...

Please sign up or login with your details

Forgot password? Click here to reset