top of page
Image by Ales Nesetril

Side-channel and fault attacks
Module duration: 16 hours

Module overview

This module focuses on physical attacks mounted on devices processing secret information. We present side-channel attacks, which exploit information leaked by the devices during computations (e.g., power consumption and electromagnetic radiations), and fault attacks, which are techniques that stress the device and lead it to improper functioning. Both attacks aim to gain sensible data or bypass countermeasures.

Objective of this module

The main objective of this module is to provide the audience with an introduction to the physical attacks that can be mounted on devices in which some cryptographic secrets are handled, with particular attention to the side-channel and faults attacks. During the module, both these classes of attacks are presented, along with their application to some well-known cryptographic algorithms. At the end of the training, the audience will better understand the mathematical and physical properties exploited in these attacks. Furthermore, the audience will learn the main countermeasures to protect an implementation against such attacks.

What you will learn:


What side-channel and fault attacks are.


How to implement these attacks on well known cryptographic algorithms


How to protect your device from these menaces

You will cover:

This module covers the following topics:

• Side-channel attacks and fault attacks
• How these attacks are implemented on AES, RSA, ECC, and Keccak algorithms
• How to mitigate them by implementing countermeasures
• Real-life examples of attacks

This module is
intended for:

This module targets professionals in silicon design, firmware or software developers, cryptographers, and security experts who need to broaden their knowledge about the security of devices in terms of physical attacks, mostly side-channels and faults attacks. Moreover, we suggest this module to managers and project managers who must acquire knowledge on the topic for their projects. We also highly recommend attending the module “Introduction to Security and Cryptography” to get the basic notions required for this module.

Image by Ales Nesetril
Contact Us

Contact Us

Fill in the form below, and we will contact you to provide details on course organization.

Thank you for your message. We'll contact you shortly.

bottom of page