Share

On a circuit with near-memory computing capabilities

© Wit Adobe Stock
Protecting the privacy of data processed by integrated circuits is a major cybersecurity challenge. The communication buses used to carry data between the processor and memory inside an integrated circuit can “leak” information that can be used to launch side channel attacks. Near-memory computing architectures, which concentrate data in a single location and limit exchanges between memory and processor, are more resistant to this kind of attack.

At CEA-List, we are investigating ways to leverage the enhanced privacy of near-memory computing architectures for data encryption. A computational SRAM (C-SRAM) IP was implemented and integrated into a SoC on an ASIC (the VASCO-2 circuit; see Figure 1). The circuit, with its 32-bit RISC-V core, memory, and C-SRAM accelerator, integrates both computing and memory.


Figure 1: VASCO-2 circuit microarchitecture (©CEA)

The C-SRAM’s near-memory computing capabilities were used to port the AES encryption algorithm. This circuit, with its hardware accelerator, is comparable to a software-only version running on the RISC-V core. The C-SRAM also has an embedded PUF encryption key generator.

In 2022 an ASIC was fabricated on GlobalFoundries’ 22 nm FD-SOI platform. A purpose-built test board with separate power supply gates for the matrix, peripheral, and logic components of the C-SRAM enabled verification of the IP’s proper functioning and characterization of the substrate.

  • The circuit was unit tested for three months.
  • AES was run on a RISC-V core with a C-SRAM accelerator.
  • C-SRAM voltage and temperature for each operator (arithmetic, logic, memory read and write access) were measured (see Figures 2 and 3).
Figure 2: The test environment (©CEA)
Figure 3: VASCO-2 measurements (GlobalFoundries 22 nm FD-SOI; 0.8 V 25° C |©CEA )
  • New instructions were identified to improve performance. An analysis of the mutual information for a 128-bit parallelized calculation on C-SRAM creates new opportunities in terms of security, particularly for the acceleration of PQC on C-SRAM (Figure 4).

 

Figure 4: Mutual information: CPU XOR vs. C-SRAM (©CEA)

 

C-SRAM’s parallelism can be exploited to effectively reduce architecture-related leakage during data transfer, a topic that will be investigated experimentally in upcoming research.

Learn more

The technology in use:

  • Pre- and post-quantum cryptographic algorithms. Generation of PUF (physical unclonable function) identifiers and encryption keys.

Major projects:

  • Inflexion Cybersecurity (CEA-List and CEA-Leti).

This ambitious project leveraged hardware and software cybersecurity innovations developed by several CEA labs. We were able to characterize and demonstrate the technologies on an ASIC target

Rebecca Cabean

Maria Ramirez Corra

Research engineer, expert — CEA

See Also

Focus areas

Cybersecurity: toward safety and privacy by design

Cybersecurity is at the heart of digital sovereignty, and an essential constituent of modern societies. As a crucial element for peace and security in cyberspace, it is an invisible but key enabler fo...
Read more