Industrial Automation and Control Systems (IACS) form the backbone of modern manufacturing, utilities, and infrastructure. From SCADA controllers and industrial drives to proprietary fieldbus networks and human-machine interfaces, these systems operate under stringent safety and cybersecurity requirements. FortifyIQ provides hardened cryptographic hardware and software solutions that deliver certified resistance to sophisticated physical attacks, enabling SoC designers, system integrators, and security leaders to meet evolving regulatory demands without compromising performance or reliability.
Many industrial control devices remain in operation for decades, often lacking hardware cryptographic protections but facing modern security standards.
Regulations like IEC 62443, NIST SP 800-82, and the EU NIS2 Directive demand proven, certifiable cryptographic modules with documented security lifecycles.
Expanding connectivity between operational technology (OT) and IT increases exposure to cyber-physical threats, including side-channel and fault-injection attacks (SCA/FIA).
Security solutions must operate deterministically with minimal latency and resource overhead, ensuring no disruption to critical control loops.
Technology-, implementation-, and foundry-agnostic, our algorithmic cryptographic protection applies equally in any silicon process or system architecture.
Certified cryptographic IP and software libraries — Validated against stringent standards including FIPS 140-3 Levels 3 and 4, SESIP Level 3 and higher, and Common Criteria AVA_VAN.5, ensuring robust protection against SCA/FIA in real-world industrial environments.
Modular Cryptobox and Root-of-Trust IPs — Combining AES, PKA (ECC/RSA), PQC, and HMAC-SHA2, customizable to your application’s needs for secure boot, firmware authentication, encrypted communications, and device lifecycle security.
Field Upgradeable Security — Our software libraries support over-the-air (OTA) updates, enabling legacy equipment to be retrofitted with certified cryptographic protection, extending device lifetime and compliance readiness.
Secure boot, encrypted data channels, and tamper-resistant firmware updates.
Protect intellectual property, secure operational parameters, and prevent reverse engineering.
Ensure secure authentication and encryption in resource-constrained communication nodes.
Integrate certifiable cryptographic protections for supply chain security and anti-counterfeiting.
With FortifyIQ’s hardware and software cryptographic solutions, industrial automation leaders can confidently secure critical control systems, protecting intellectual property, operational integrity, and regulatory compliance for decades to come.
“Summary. The leakage analysis (Welch t-test) on over 30 million traces did not show statistically significant first- and second-order differences between trace sets with fixed and random inputs. The template-based DPA analysis, on the pseudo-random trace set for the profiling phase (15 million traces) and on a sub-set of 300k fix input traces for matching phase targeting the first-round S-box output, and template attack on ciphertext, did not indicate any potential information leakage.”
” The results for the soft IP presented in the report were obtained on the TOE which is the basic hardware implementation of the soft IP without additional levels of security (e.g. that are present in a secure silicon layout). Therefore the internal strength of the soft IP itself was evaluated. This indicates that the investigated features and parameters of the soft IP implementation should be robust against SCA and fault injection attacks in different implementations including ASIC. Nevertheless, according to the Common Criteria rules, the strength of the final composite product must be evaluated on its own.”