International Association for Cryptologic Research

International Association
for Cryptologic Research

Transactions on Cryptographic Hardware and Embedded Systems 2025

CHERI-Crypt:

Transparent Memory Encryption on Capability Architectures


Jennifer Jackson
University of Birmingham, Birmingham, UK

Minmin Jiang
University of Birmingham, Birmingham, UK

David Oswald
University of Birmingham, Birmingham, UK


Keywords: Memory Encryption, CHERI, RISC-V, Capability Architectures, Confidential Computing, Trusted Execution Environments


Abstract

Capability architectures such as CHERI (Capability Hardware Enhanced RISC Instructions) are an emerging technology designed to provide memory safety protection at the hardware level and are equipped to eradicate approximately 70% of the current software vulnerability attack surface. CHERI is an instruction set architecture extension and has been applied to a small number of processors, including various versions of RISC-V. One of the benefits of CHERI is that it inherently provides segregation or compartmentalisation of software, making it suitable for supporting other types of applications such as Trusted Execution Environments, where sensitive data and computation is conducted inside a secure enclave, away from the rest of the untrusted operating system and services. To prevent untrusted software from accessing these compartments or secure regions of memory CHERI uses the mechanism of sealed capabilities. Trusted execution environments however, have been proven vulnerable to not just software-based attacks, but hardware attacks as well. In this paper we present our CHERI-Crypt design, an encryption engine extension to a CHERI-RISC-V 32-bit processor, for transparent memory encryption of sealed CHERI capabilities to additionally protect sensitive data in memory against physical hardware attacks. We show that our CHERI-Crypt design can run an enclave test program within an encrypted CHERI seal and invoke process, requiring 626 additional clock cycles with a batch size of 32 bytes. Adding CHERI-Crypt reduces the maximum frequency of the base CPU by only 6 MHz, and requires approximately 3.5x more flip flops and LUTs.

Publication

IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2025, Issue 2

Paper

Artifact

Artifact number
tches/2025/a14

Artifact published
July 18, 2025

Badge
IACR CHES Artifacts Functional

README

ZIP (1110472 Bytes)  

View on Github

License
This work is licensed under the MIT License.

Some files in this archive are licensed under a different license. See the contents of this archive for more information.

Note that license information is supplied by the authors and has not been confirmed by the IACR.


BibTeX How to cite

Jennifer Jackson, Minmin Jiang, David Oswald. (2025). CHERI-Crypt: Transparent Memory Encryption on Capability Architectures. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(2), 268–292. https://doi.org/10.46586/tches.v2025.i2.268-292. Artifact at https://artifacts.iacr.org/tches/2025/a14.