International Association for Cryptologic Research

International Association
for Cryptologic Research

Transactions on Cryptographic Hardware and Embedded Systems 2025

KeyVisor – A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies


Fabian Schwarz
CISPA Helmholtz Center for Information Security, Saarbrücken, Germany

Jan Philipp Thoma
Ruhr University Bochum, Bochum, Germany

Christian Rossow
CISPA Helmholtz Center for Information Security, Saarbrücken, Germany

Tim Güneysu
Ruhr University Bochum, Bochum, Germany; DFKI GmbH, Bremen, Germany


Keywords: Security Extensions, Microarchitecture, Key Management


Abstract

The confidentiality of cryptographic keys is essential for the security of protection schemes used for communication, file encryption, and outsourced compu- tation. Beyond cryptanalytic attacks, adversaries can steal keys from memory via software exploits or side channels, enabling them to, e.g., manipulate confidential information or impersonate key owners. Therefore, existing defenses protect keys in dedicated devices or isolated memory, or store them only in encrypted form. However, these designs often provide unfavorable tradeoffs, sacrificing performance, fine-grained access control, or deployability.In this paper, we present KeyVisor, a lightweight Instruction Set Architecture ( ISA) extension that securely offloads the handling of symmetric crypto keys to the CPU. KeyVisor provides CPU instructions that enable applications to request protected key handles and perform AEAD cipher operations on them. The underlying keys are accessible only by KeyVisor, and thus never leak to memory. KeyVisor’s direct CPU integration enables fast crypto operations and hardware-enforced key usage restrictions, e.g., keys usable only for de-/encryption, with a limited lifetime, or with a process binding. Furthermore, privileged software, e.g., the monitor firmware of TEEs, can revoke keys or bind them to a specific process/TEE. We implement KeyVisor for RISC-V based on RocketChip, evaluate its performance, and demonstrate real-world use cases, including key-value databases, automotive feature licensing, and a read-only network middlebox.

Publication

IACR Transactions on Cryptographic Hardware and Embedded Systems, Volume 2025, Issue 3

Paper

Artifact

Artifact number
tches/2025/a22

Artifact published
September 1, 2025

Badge
IACR CHES Artifacts Available

README

ZIP (845538 bytes)  

View on Github

License

Note that license information is supplied by the authors and has not been confirmed by the IACR.


BibTeX How to cite

Fabian Schwarz, Jan Philipp Thoma, Christian Rossow, Tim Güneysu. (2025). KeyVisor – A Lightweight ISA Extension for Protected Key Handles with CPU-enforced Usage Policies. IACR Transactions on Cryptographic Hardware and Embedded Systems, 2025(3), 1–31. https://doi.org/10.46586/tches.v2025.i3.1-31. Artifact at https://artifacts.iacr.org/tches/2025/a22.