Expert insights, academic papers, and videos to fuel your chip-to-cloud security compliance.
Learn MoreHigh-assurance cryptographic implementations of AES, HMAC, PKA, PQC, CryptoBox, and Root-of-Trust families, and software libraries, all exceptionally efficient (PPA-optimized).
See MoreProvide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
Secures both new and already-deployed devices, including those without hardware countermeasures, and is proven in millions of systems.
Provides ultra-strong protection against SCA, FIA, and cache attacks.
What are side-channel and fault-injection attacks, and why would your device need protection against them? Etc.
Provides a comprehensive suite of post-quantum cryptography hardware, including CryptoBoxes, IP cores, and Root-of-Trust modules.
Provide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
CryptoBoxes and Roots of Trust (RoTs) integrate post-quantum and classical cryptography in a unified, high-assurance architecture.
Why post-quantum cryptography matters? Etc.
The most popular myths and facts about post-quantum cryptography.
Enables engineers to evaluate and strengthen hardware designs against fault injection attacks, e.g., DFA, SIFA, and AFA.
Pre-silicon EDA tool suite designed to identify, analyze, and mitigate side-channel vulnerabilities in hardware designs from RTL.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
How does FortifyIQ validate resistance to side-channel and fault-injection attacks? Etc.
Resilient cryptographic protection for payment systems, digital banking, and secure financial infrastructure.
Secure cryptographic foundations for identity systems, defense infrastructure, and digital government platforms.
From payment cards to e-passports, SIMs, and digital ID tokens, smart cards and digital identity solutions power critical transactions.
Securing network infrastructure, subscriber identity, and cloud-native telecommunication systems.
Automotive Cybersecurity IPs and Tools for ECUs, ADAS, AV and In-Vehicle-Infotainment (IVI) Systems.
Robust, certifiable security solutions for next-generation industrial automation and control systems.
Cryptographic security tailored to the needs of energy systems: robust protection against side-channel and fault injection attacks.
Safeguarding energy, water, and transportation systems with certifiable hardware and software security.
Cryptographic protection engineered for the longevity, safety, and regulatory demands of rail and transportation systems.
Ultra-high-throughput, physically secure cryptographic IP for cloud and data center silicon.
Cryptographic protection for IoT systems, with unmatched resistance to side-channel analysis and fault injection attacks.
Secure cryptography and OTA updates for ultra-constrained, mission-critical medical electronics.
Robust, efficient cryptographic protections for media platforms that resist real-world physical attacks with minimal performance tradeoffs.
Cryptographic solutions purpose-built for silicon IP protection, licensing enforcement, and clone detection.
In healthcare, we provide comprehensive cryptographic solutions — from traditional to post-quantum cryptography.
Expert insights, academic papers, and videos to fuel your chip-to-cloud security compliance.
Learn MoreThis section features FortifyIQ's academic publications, presenting AES protection techniques against side-channel and fault injection attacks and side-channel attacks on SHA-2-based HMAC.
Learn MoreThis section demonstrates how FortifyIQ validates cryptographic solutions, compares ours against other secure cores, and showcases FortiEDA for evaluating and developing secure designs.
Learn MoreOur explanatory videos break down complex hardware security concepts into clear, visual stories, showcasing how FortifyIQ's technologies detect and prevent side-channel and fault-injection attacks.
Learn MoreStay informed with our latest updates, announcements, and insights, including industry developments, company milestones, and important highlights shaping our work and community.
Learn MoreRead our official statements and announcements for media and stakeholders, featuring key company updates, partnerships, product launches, and other important organizational news.
Learn MoreJoin our online sessions to explore expert insights, practical knowledge, and discussions on relevant topics. Watch live or access recordings to learn from industry professionals.
Learn MoreDiscover upcoming conferences, meetings, and special gatherings where you can connect with our team, partners, and community members, and stay engaged with our latest initiatives.
Learn MorePioneers in hardware-based security innovation, combining cutting-edge cryptography with advanced defense mechanisms, dedicated to safeguarding the digital world’s most critical assets.
Learn MoreOur services ensure that security, performance, power, and area are balanced optimally, without compromising certifiable high-assurance protection against side-channel and fault-injection attacks.
Learn MoreAt FortifyIQ, our R&D team is a unique blend of industry veterans with deep expertise in mathematics and cybersecurity, alongside talented young engineers who bring fresh perspectives and innovative thinking.
Learn MoreWe seek exceptional individuals who are passionate about tackling the toughest challenges facing hardware manufacturers today and ready to take on whatever comes next.
Join UsFortifyIQ delivers security IP with measurable, verifiable, and repeatable assurance.
Every product undergoes rigorous validation at multiple stages, RTL/netlist, FPGA, silicon, and in software (our libraries), using our FortiEDA tools which implement industry-standard TVLA methods, and real-world attack testing. Independent lab validation, solid mathematical foundations, and algorithmic protections support their high assurance security. After release, our IP cores are often validated and/or certified by third-party labs either as standalone blocks or integrated in complete secure chips.
Because our IP is highly tunable, no single certification can cover every customer configuration. Instead, we validated the core protection algorithm at the highest security level (Common Criteria AVA_VAN.5). Customers benefit from documentation packages, validation results, and academic references that support their own certification efforts.
The tools can both generate traces in simulation and analyze traces captured from a physical oscilloscope. This enables us to identify leakage at the gate level, confirm resilience against active attacks, and provide assurance long before deployment, whether in silicon or in software-only environments.
Massive trace acquisition at exceptional speed, scaling from single-core to multi-core and multi-machine setups, supports security validation with traces well beyond the amount required for FIPS 140-3 and Common Criteria.
Our validation covers all known categories of physical attacks, actively testing resilience besides checking for leakage:
These ensure resilience against both overt and stealthy fault attacks, which could otherwise compromise keys or intermediate secrets without triggering detectable errors.
FortifyIQ backs its claims with measurable results:
validated with 100 million measurements, tested against the known HMAC hardware attacks with no information leakage.
validated in silicon with both side-channel and fault-injection testing.
These results exceed the requirements of Common Criteria AVA_VAN.5, SESIP (level 5) and FIPS 140-3 Levels 3 and 4.
Features a formal security proof of side-channel security. Validated against 15 million measurements with no leakage, and silicon tested.
Uses a patented variant of the Threshold Implementation paradigm, mathematically proven to resist all known side-channel attacks on HMAC in hardware. Validated with 100 million traces.
FortifyIQ delivers hardware IPs as soft macros and software IPs with hundreds of configuration options for fine-tuning of performance, power, area, and redundancy (security parameter level). Because no single certification can represent every configuration, we certified AES RAMBAM, our core algorithmic protection, (which is the most difficult element to validate), to the highest level (AVA_VAN.5). Our products all meet this security level.
Quoting from SGS Brightsight Laboratory’s AVA_VAN.5 validation of our core algorithm:
“The results for the soft IP presented in the report were obtained on the TOE which is the basic hardware implementation of the soft IP without additional levels of security (e.g. that are present in a secure silicon layout). Therefore the internal strength of the soft IP itself was evaluated. This indicates that the investigated features and parameters of the soft IP implementation should be robust against SCA and fault injection attacks in different implementations including ASIC. Nevertheless, according to the Common Criteria rules, the strength of the final composite product must be evaluated on its own.”
Our protections are purely algorithmic, thus implementation-agnostic, avoiding the pitfalls of manual countermeasure integration. As long as our simple integration guidelines are followed, there will be consistent, high-assurance protection across all configurations.
FortifyIQ aligns its validation methods with FIPS 140-3 and Common Criteria, and supports customers with:
Documentation packages
including validation data and academic references.
Independent validation reports, such as SGS Brightsight’s AES certification.
Security foundations
based on mathematical articles and security proofs, providing a unique basis for high-assurance certification.
Support
from design to certification, as a security partner, to help customers achieve their targeted certification.
This combination streamlines the customer’s certification process, reducing risk, cost, and time to market.
FortifyIQ provides transparent and thorough security assurance
This approach ensures that FortifyIQ IP delivers high-assurance protection across all devices, from legacy embedded systems to advanced cloud platforms.