Paper 2018/072

Template-based Fault Injection Analysis of Block Ciphers

Ashrujit Ghoshal, Sikhar Patranabis, and Debdeep Mukhopadhyay


We present the first template-based fault injection analysis of FPGA-based block cipher implementations. While template attacks have been a popular form of side-channel analysis in the cryptographic literature, the use of templates in the context of fault attacks has not yet been explored to the best of our knowledge. Our approach involves two phases. The first phase is a profiling phase where we build templates of the fault behavior of a cryptographic device for different secret key segments under different fault injection intensities. This is followed by a matching phase where we match the observed fault behavior of an identical but black-box device with the pre-built templates to retrieve the secret key. We present a generic treatment of our template-based fault attack approach for SPN block ciphers, and illustrate the same with case studies on a Xilinx Spartan-6 FPGA-based implementation of AES-128.

Available format(s)
Publication info
Published elsewhere. 8th International Conference on Security, Privacy, and Applied Cryptography Engineering(SPACE 2018)
Template AttacksFault InjectionFault Intensity
Contact author(s)
ashrujit ck @ gmail com
2018-10-18: revised
2018-01-18: received
See all versions
Short URL
Creative Commons Attribution


      author = {Ashrujit Ghoshal and Sikhar Patranabis and Debdeep Mukhopadhyay},
      title = {Template-based Fault Injection Analysis of Block Ciphers},
      howpublished = {Cryptology ePrint Archive, Paper 2018/072},
      year = {2018},
      note = {\url{}},
      url = {}
Note: In order to protect the privacy of readers, does not use cookies or embedded third party content.