Previous Article in Journal
Lower Bound on the Overlattice-Based Sieve Algorithm
 
 
Font Type:
Arial Georgia Verdana
Font Size:
Aa Aa Aa
Line Spacing:
Column Width:
Background:
This is an early access version, the complete PDF, HTML, and XML versions will be available soon.
Article

Secure Implementation of RISC-V’s Scalar Cryptography Extension Set

Department of Computer Engineering, Faculty of Electrical Engineering, Mathematics and Computer Science, Delft University of Technology, 2628 CD Delft, The Netherlands
*
Authors to whom correspondence should be addressed.
Cryptography 2026, 10(1), 6; https://doi.org/10.3390/cryptography10010006 (registering DOI)
Submission received: 17 December 2025 / Revised: 7 January 2026 / Accepted: 14 January 2026 / Published: 17 January 2026
(This article belongs to the Topic Recent Advances in Security, Privacy, and Trust)

Abstract

Instruction Set Architecture (ISA) extensions, particularly scalar cryptography extensions (Zk), combine the performance advantages of hardware with the adaptability of software, enabling the direct and efficient execution of cryptographic functions within the processor pipeline. This integration eliminates the need to communicate with external cores, substantially reducing latency, power consumption, and hardware overhead, making it especially suitable for embedded systems with constrained resources. However, current scalar cryptography extension implementations remain vulnerable to physical threats, notably power side-channel attacks (PSCAs). These attacks allow adversaries to extract confidential information, such as secret keys, by analyzing the power consumption patterns of the hardware during operation. This paper presents an optimized and secure implementation of the RISC-V scalar Advanced Encryption Standard (AES) extension (Zkne/Zknd) using Domain-Oriented Masking (DOM) to mitigate first-order PSCAs. Our approach features optimized assembly implementations for partial rounds and key scheduling alongside pipeline-aware microarchitecture optimizations. We evaluated the security and performance of the proposed design using the Xilinx Artix7 FPGA platform. The results indicate that our design is side-channel-resistant while adding a very low area overhead of 0.39% to the full 32-bit CV32E40S RISC-V processor. Moreover, the performance overhead is zero when the extension-related instructions are properly scheduled.
Keywords: Advanced Encryption Standard (AES); scalar cryptography extensions; domain-oriented masking; side-channel attacks; RISC-V Advanced Encryption Standard (AES); scalar cryptography extensions; domain-oriented masking; side-channel attacks; RISC-V

Share and Cite

MDPI and ACS Style

Kassimi, A.; Aljuffri, A.; Larmann, C.; Hamdioui, S.; Taouil, M. Secure Implementation of RISC-V’s Scalar Cryptography Extension Set. Cryptography 2026, 10, 6. https://doi.org/10.3390/cryptography10010006

AMA Style

Kassimi A, Aljuffri A, Larmann C, Hamdioui S, Taouil M. Secure Implementation of RISC-V’s Scalar Cryptography Extension Set. Cryptography. 2026; 10(1):6. https://doi.org/10.3390/cryptography10010006

Chicago/Turabian Style

Kassimi, Asmaa, Abdullah Aljuffri, Christian Larmann, Said Hamdioui, and Mottaqiallah Taouil. 2026. "Secure Implementation of RISC-V’s Scalar Cryptography Extension Set" Cryptography 10, no. 1: 6. https://doi.org/10.3390/cryptography10010006

APA Style

Kassimi, A., Aljuffri, A., Larmann, C., Hamdioui, S., & Taouil, M. (2026). Secure Implementation of RISC-V’s Scalar Cryptography Extension Set. Cryptography, 10(1), 6. https://doi.org/10.3390/cryptography10010006

Article Metrics

Article metric data becomes available approximately 24 hours after publication online.
Back to TopTop