Transactions on Cryptographic Hardware and Embedded Systems 2025
CHERI-Crypt:
Transparent Memory Encryption on Capability Architectures
Jennifer Jackson
University of Birmingham, Birmingham, UK
Minmin Jiang
University of Birmingham, Birmingham, UK
David Oswald
University of Birmingham, Birmingham, UK
Keywords: Memory Encryption, CHERI, RISC-V, Capability Architectures, Confidential Computing, Trusted Execution Environments
Abstract
Capability architectures such as CHERI (Capability Hardware Enhanced RISC Instructions) are an emerging technology designed to provide memory safety protection at the hardware level and are equipped to eradicate approximately 70% of the current software vulnerability attack surface. CHERI is an instruction set architecture extension and has been applied to a small number of processors, including various versions of RISC-V. One of the benefits of CHERI is that it inherently provides segregation or compartmentalisation of software, making it suitable for supporting other types of applications such as Trusted Execution Environments, where sensitive data and computation is conducted inside a secure enclave, away from the rest of the untrusted operating system and services. To prevent untrusted software from accessing these compartments or secure regions of memory CHERI uses the mechanism of sealed capabilities. Trusted execution environments however, have been proven vulnerable to not just software-based attacks, but hardware attacks as well. In this paper we present our CHERI-Crypt design, an encryption engine extension to a CHERI-RISC-V 32-bit processor, for transparent memory encryption of sealed CHERI capabilities to additionally protect sensitive data in memory against physical hardware attacks. We show that our CHERI-Crypt design can run an enclave test program within an encrypted CHERI seal and invoke process, requiring 626 additional clock cycles with a batch size of 32 bytes. Adding CHERI-Crypt reduces the maximum frequency of the base CPU by only 6 MHz, and requires approximately 3.5x more flip flops and LUTs.
Publication
IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2025, Issue 2
PaperArtifact
Artifact number
tches/2025/a14
Artifact published
July 18, 2025
Badge
✅ IACR CHES Artifacts Functional
License
This work is licensed under the MIT License.
Some files in this archive are licensed under a different license. See the contents of this archive for more information.
Note that license information is supplied by the authors and has not been confirmed by the IACR.
BibTeX How to cite
Jennifer Jackson, Minmin Jiang, David Oswald. (2025). CHERI-Crypt: Transparent Memory Encryption on Capability Architectures. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(2), 268–292. https://doi.org/10.46586/tches.v2025.i2.268-292. Artifact at https://artifacts.iacr.org/tches/2025/a14.