This project demonstrates controlled insertion of a stealth hardware Trojan into a pipelined AES-128 cryptographic core and its detection using post-synthesis power analysis.
A plaintext-triggered payload was integrated at the final round stage of AES to manipulate the 10th round key, enabling cryptographic key extraction. Detection was performed using averaged and time-based dynamic power analysis with industry-standard Synopsys tools.
The work models realistic stealth Trojan behavior and validates non-invasive detection via power profiling.
- 10-round pipelined AES-128 core
- Dedicated key expansion module
- Round-based transformation pipeline
- Trojan insertion at final round input stage
- Activated when a specific 128-bit plaintext appears three times
- Counter-based sequential detection
- Persistent activation after trigger
- Overrides final round data path using bitwise injection
- Produces predictable corrupted ciphertext
- Enables recovery of 10th round key
- Original AES key reconstructed via reverse key expansion (Python)
RTL (Clean + Trojan) ↓ Synopsys Design Compiler ↓ Gate-Level Netlist ↓ VCS Simulation → VCD Activity ↓ PrimePower (Averaged Dynamic Power) PrimeTime (Time-Based Power)
| Design | Dynamic Power |
|---|---|
| Clean AES | 160145.58 µW |
| Trojan Activated | 160174.52 µW |
Measured Difference: 28.94 µW
| Design | Power |
|---|---|
| Clean AES | 0.1266 W |
| Trojan Activated | 0.1267 W |
Measured Difference: 100 µW
- Functional outputs remain correct during normal operation
- Power profiles nearly identical under non-trigger conditions
- Detectable power anomaly observed only during Trojan activation
- Demonstrates stealth behavior consistent with hardware security literature
rtl/
├── common/
├── aes_clean/
└── aes_trojan/
tb/
scripts/
report.pptx
docs/
- SystemVerilog
- Synopsys Design Compiler
- Synopsys VCS
- Synopsys PrimePower
- Synopsys PrimeTime
- TCL scripting
- Python (Key reconstruction)
- Demonstrates controlled RTL-level Trojan insertion
- Shows ASIC flow from RTL → Netlist → Power Analysis
- Validates power-based detection threshold
- Bridges cryptographic security and hardware verification