Hybrid PQC and Classical Crypto Hardware Solutions

FortifyIQ’s CryptoBoxes and Roots of Trust (RoTs) integrate post-quantum (ML-KEM/ML-DSA) and classical cryptography (AES, HMAC, PKA) in a unified, high-assurance architecture. This hybrid approach allows secure coexistence and gradual migration to post-quantum cryptography while maintaining interoperability with existing infrastructure.

Architecture & Features

  • Combines PQC and classical algorithms in one hardware or mixed hardware & software module
  • Implementation-, foundry-, and technology-agnostic (soft IP cores)
  • Tunable for device- and industry-specific requirements
  • Matches naive PQC hardware implementations in performance and latency
  • Resistant to side-channel and fault-injection attacks, certifiable to FIPS 140-3 up to Level 4, Common Criteria AVA_VAN.5, SESIP up to Level 5
  • Benefits from the unified API, enabling:
Firmware-OTA (FOTA) updates of PQC algorithms on hybrid modules
Flexibility to combine HW and SW for optimal performance and efficiency
Consistent deployment interface across hardware, software, or hybrid architectures
Future-proof upgrades as new PQC algorithms or countermeasures become available

Use Cases:

  • High-assurance chiplets and SoCs requiring hybrid cryptography support
  • CryptoBoxes and RoTs for cloud, edge, and embedded security
  • Gradual migration from classical to post-quantum cryptography
  • Systems requiring dual-protection for regulatory compliance and high-assurance operations
  • Aerospace and defense applications requiring flexible and radiation-tolerant hybrid cryptography

Features excellent PPA efficiency with robust protection against side-channel and fault-injection attacks.



Tunable to each deployment’s needs.
Ideal for future-proof security in embedded systems, chips, and chiplets.

Hybrid: Classical + Post-Quantum Cryptographic Solutions

Datasheets available upon request

Delivers exceptional power, performance, and area efficiency while supporting both classical public-key cryptography (RSA, ECC) and post-quantum algorithms (ML-KEM, ML-DSA).

Their flexible architecture unifies key exchange, digital signatures, authenticated encryption, secure boot, and firmware updates, with advanced protections against side-channel and fault injection attacks, providing a secure, future-proof foundation for long life-cycle applications.

Integrated Secure Crypto Subsystems

Datasheets available upon request
Datasheets available upon request

Family of fully customisable Roots of Trust designed for a wide range of applications. All RoTs are hardened against side-channel and fault injection attacks, ensuring strong security even in highly constrained or hostile environments.

The portfolio includes specialized variants for IoT, cloud, chiplets, general-purpose (balanced), and edge AI, providing flexible integration and performance trade-offs to suit your system requirements. FortifyIQ RoTs are fully compatible with Caliptra, supporting robust cryptographic operations, secure key management, and on-the-fly encryption where applicable.

Root-of-Trust IP

FIQ-RoT01B
Edge AI – Balanced
FIQ-RoT02F
Cloud – Fast
FIQ-RoT03C
IoT – Compact
FIQ-RoT04B
Chiplet – Balanced
FIQ-RoT05B
General Purpose – Balanced
Datasheets available upon request
Datasheets available upon request
Fortify’s AES security evaluation by SGS

“Summary. The leakage analysis (Welch t-test) on over 30 million traces did not show statistically significant first- and second-order differences between trace sets with fixed and random inputs. The template-based DPA analysis, on the pseudo-random trace set for the profiling phase (15 million traces) and on a sub-set of 300k fix input traces for matching phase targeting the first-round S-box output, and template attack on ciphertext, did not indicate any potential information leakage.”

” The results for the soft IP presented in the report were obtained on the TOE which is the basic hardware implementation of the soft IP without additional levels of security (e.g. that are present in a secure silicon layout). Therefore the internal strength of the soft IP itself was evaluated. This indicates that the investigated features and parameters of the soft IP implementation should be robust against SCA and fault injection attacks in different implementations including ASIC. Nevertheless, according to the Common Criteria rules, the strength of the final composite product must be evaluated on its own.”

Request Technical Details