Skip to content
  • Products
    • Protection of AI-Models
    • Root of Trust (RoT)
    • Software Libraries
      • FortiCrypt Library – Advanced DPA- and FIA-Resistant Software Library
      • FortiMac library – Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library
    • Security Cryptographic HW IP Cores
      • FortiCrypt
        • AES XP-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra High Bandwidth FortiCrypt AES IP Core
        • AES ULP-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra Low Power FortiCrypt AES IP Core
        • AES UC-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra Compact FortiCrypt AES IP Core
        • AES SX-DPA-FIA IP Core – DPA- and FIA-Resistant Balanced FortiCrypt AES IP Core
        • FortiCrypt Library – Advanced DPA- and FIA-Resistant Software Library
      • FortiMac
        • HMAC-SHA2-DPA-FIA IP Core – Advanced DPA- and FIA-Resistant FortiMac HMAC SHA2 IP Core
        • FortiMac library – Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library
      • FortiPKA
        • FortifyIQ | Public Key Accelerator (PKA)
        • FortiPKEx
    • EDA Tools for Security Assessment and Verification
      • SideChannel Studio
      • FaultInjection Studio
    • Professional Services
  • Industry
    • Healthcare
  • Insights
    • Conference Papers
    • Whitepapers
    • Explanatory Videos
  • News
  • Company
    • About Us
    • Services
    • Our Team
    • Careers
  • Contact Us
  • Products
    • Protection of AI-Models
    • Root of Trust (RoT)
    • Software Libraries
      • FortiCrypt Library – Advanced DPA- and FIA-Resistant Software Library
      • FortiMac library – Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library
    • Security Cryptographic HW IP Cores
      • FortiCrypt
        • AES XP-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra High Bandwidth FortiCrypt AES IP Core
        • AES ULP-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra Low Power FortiCrypt AES IP Core
        • AES UC-DPA-FIA IP Core – DPA- and FIA-Resistant Ultra Compact FortiCrypt AES IP Core
        • AES SX-DPA-FIA IP Core – DPA- and FIA-Resistant Balanced FortiCrypt AES IP Core
        • FortiCrypt Library – Advanced DPA- and FIA-Resistant Software Library
      • FortiMac
        • HMAC-SHA2-DPA-FIA IP Core – Advanced DPA- and FIA-Resistant FortiMac HMAC SHA2 IP Core
        • FortiMac library – Advanced HMAC SHA2 DPA- and FIA-Resistant Software Library
      • FortiPKA
        • FortifyIQ | Public Key Accelerator (PKA)
        • FortiPKEx
    • EDA Tools for Security Assessment and Verification
      • SideChannel Studio
      • FaultInjection Studio
    • Professional Services
  • Industry
    • Healthcare
  • Insights
    • Conference Papers
    • Whitepapers
    • Explanatory Videos
  • News
  • Company
    • About Us
    • Services
    • Our Team
    • Careers
  • Contact Us
Contact Us

INSIGHTS

Hardware Security Attacks - A Clear and Present Danger

Discover various challenges in the design and verification of silicon security now! You will learn what FortifyIQ can offer you to resolve these challenges and save you costs in time and security design.

Watch Now
All Explanatory Videos

Conference Papers:

First Full-Fledged Side Channel Attack on HMAC-SHA-2

FortifyIQ presents a novel practical template attack on HMAC-SHA-2 intended primarily against its implementations in hardware.
Start Reading

Redundancy AES Masking Basis for Attack Mitigation (RAMBAM)

FortifyIQ presents RAMBAM - a novel concept of designing countermeasures against side-channel attacks and the Statistical Ineffective Fault Attack (specifically SIFA-1) on AES that employs redundant representations of finite field elements.
Start Reading

Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

FortifyIQ provides full mathematical analysis of the method and shows that, under certain assumptions and with a sufficient amount of traces, any key can be revealed. In the experimental part of the paper, FortifyIQ demonstrates a successful application of the attack both in software simulation and on an FPGA board using power consumption measurements.

Presented at the CHES 2023 conference

Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2

In this paper, FortifyIQ introduces Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes involving arithmetical addition. This methodology is applied to what is believed to be the first published full-fledged attack on HMAC-SHA-2 which does not require a profiling stage.

Start Reading

Whitepapers:

Of the various kinds of side-channel attacks, Differential Power Analysis (DPA) is the cheapest to deploy with potentially the highest amount of damage to the manufacturer.

What can be done to protect IoT devices from such attacks?
Discover a new approach to developing protection for smart cards against Differential Power Analysis (DPA) attacks, allowing manufacturers to cut protection costs and save time during development.
Discover a new approach to developing protection for smart cards against DEMA attacks, allowing manufacturers to cut protection costs and save time during development.
FortifyIQ offers a complete suite of solutions for DPA, SPA and FI detection, analysis, and recommendations for protecting your microchips and products from successful DPA and FI attacks.
  • Insights
  • News
  • Company
Hardware-Security
IP Foundation:
From IoT to Cloud
Side-Channel and Fault Injection
Protection with FortifyIQ

81 Washington Street, Suite #307

Salem, MA 01970

USA

© 2025 FortifyIQ, Inc.

  • Terms & Conditions
  • Cookie Policy
  • Privacy Policy