Lightweight block cipher PRESENT is an algorithm with SPN structure. Due to its excellent hardware performance and simple round function design, it can be well applied to Internet of things terminals with limited computing resources. As an improved cipher of PRESENT, GIFT is similar in structure to PRESENT and has been widely concerned by academia and industry. This paper studies the P permutation law of PRESENT and GIFT, and presents a general differential fault attack(DFA) method with their differential characteristics. For PRESENT, this paper chooses to inject a nibble fault before the 30 th and 31 st rounds of S-box operation. A total of 32 nibble fault ciphertexts are needed to recover the original key. The computational complexity and data complexity are 2 10.94 and 2 8 , respectively. For GIFT, this paper chooses to inject a nibble fault before the 25 th , 26 th , 27 th and 28 th rounds of S-box operation. A total of 64 nibble fault ciphertexts are needed to recover the original key. The computational complexity and data complexity are 2 11.91 and 2 9 , respectively. Compared with other public cryptoanalysis results of PRESENT and GIFT, this general attack method has great advantages. In this paper, the DFA of GIFT is experimentally verified and the effectiveness is proved. These experiments have been done on a personal computer and run in a very reasonable time(around 500ms).