FortifyIQ
Security Assurance
FortifyIQ delivers security IP with measurable, verifiable, and repeatable assurance.
1. Validation with FortiEDA
1
RTL / netlist design stage (for hardware IP)
2
FPGA prototype board (for pre-silicon hardware and software validation)
3
Final in-silicon product (for fabricated chips, including AES RAMBAM, AES STORM, PKA, and more in process)
4
Compiled cryptographic libraries (evaluation on FPGA boards and real processors, validated on platforms ranging from ARM Cortex-M3/M4, ARM Cortex-A53, and x86-64 to modern multicore processors, using compilers such as GCC and ARM Compiler 6 )
The tools can both generate traces in simulation and analyze traces captured from a physical oscilloscope. This enables us to identify leakage at the gate level, confirm resilience against active attacks, and provide assurance long before deployment, whether in silicon or in software-only environments.
Massive trace acquisition at exceptional speed, scaling from single-core to multi-core and multi-machine setups, supports security validation with traces well beyond the amount required for FIPS 140-3 and Common Criteria.
2. Coverage of Attack Classes
Our validation covers all known categories of physical attacks, actively testing resilience besides checking for leakage:
Side-Channel Attacks (SCA)
- Differential & Correlation Power Analysis (DPA, CPA)
- Electromagnetic Analysis (EMA)
- Timing attacks
- Higher-order and template attacks
- Cache and memory-based attacks (relevant to software implementations)
Fault Injection Attacks (FIA)
- Differential Fault Analysis (DFA)
- Statistical Ineffective Fault Analysis (SIFA, light-SIFA)
- Safe-error and instruction/data skipping
- Voltage, clock, and electromagnetic glitching
These ensure resilience against both overt and stealthy fault attacks, which could otherwise compromise keys or intermediate secrets without triggering detectable errors.
3. Evidence Through Measurement
FortifyIQ backs its claims with measurable results:
AES cores
HMAC-SHA2
HMAC-SHA2
validated with 100 million measurements, tested against the known HMAC hardware attacks with no information leakage.
Public Key Accelerators (PKA - RSA, ECDSA, ECDH, EdDSA, etc.)
validated in silicon with both side-channel and fault-injection testing.
These results exceed the requirements of Common Criteria AVA_VAN.5, SESIP (level 5) and FIPS 140-3 Levels 3 and 4.
4. Security Proven Designs with Validation
AES RAMBAM
AES STORM
Features a formal security proof of side-channel security. Validated against 15 million measurements with no leakage, and silicon tested.
HMAC-SHA2 (TI-based)
Uses a patented variant of the Threshold Implementation paradigm, mathematically proven to resist all known side-channel attacks on HMAC in hardware. Validated with 100 million traces.
Both RAMBAM and STORM are validated in simulation, FPGA, and silicon, proving resilience beyond lab conditions.
5. Configurable and Implementation - Agnostic IP
FortifyIQ delivers hardware IPs as soft macros and software IPs with hundreds of configuration options for fine-tuning of performance, power, area, and redundancy (security parameter level). Because no single certification can represent every configuration, we certified AES RAMBAM, our core algorithmic protection, (which is the most difficult element to validate), to the highest level (AVA_VAN.5). Our products all meet this security level.
Quoting from SGS Brightsight Laboratory’s AVA_VAN.5 validation of our core algorithm:
“The results for the soft IP presented in the report were obtained on the TOE which is the basic hardware implementation of the soft IP without additional levels of security (e.g. that are present in a secure silicon layout). Therefore the internal strength of the soft IP itself was evaluated. This indicates that the investigated features and parameters of the soft IP implementation should be robust against SCA and fault injection attacks in different implementations including ASIC. Nevertheless, according to the Common Criteria rules, the strength of the final composite product must be evaluated on its own.”
Our protections are purely algorithmic, thus implementation-agnostic, avoiding the pitfalls of manual countermeasure integration. As long as our simple integration guidelines are followed, there will be consistent, high-assurance protection across all configurations.
6. Certification Support
FortifyIQ aligns its validation methods with FIPS 140-3 and Common Criteria, and supports customers with:
Documentation packages
including validation data and academic references.
Independent validation reports, such as SGS Brightsight’s AES certification.
Security foundations
based on mathematical articles and security proofs, providing a unique basis for high-assurance certification.
Support
from design to certification, as a security partner, to help customers achieve their targeted certification.
This combination streamlines the customer’s certification process, reducing risk, cost, and time to market.
Summary
FortifyIQ provides transparent and thorough security assurance
- Validation at netlist/RTL, FPGA, and in silicon with proprietary EDA tools.
- Coverage of all SCA and FIA attack classes.
- Evidence backed by billions of measurements.
- Independent third-party validations and mathematical foundations.
- Support for customer certification with tailored documentation throughout their certification process, from design to certification labs.
This approach ensures that FortifyIQ IP delivers high-assurance protection across all devices, from legacy embedded systems to advanced cloud platforms.