IP Catalog

FortifyIQ offers a new generation of products, protected against SCA and FIA, which utilize purely algorithmic, implementation-agnostic algorithms.

Our prebuilt cryptographic modules provide unparalleled protection against side-channel (SC) attacks and fault injection (FI) attacks, such as Differential Power Analysis Attacks, Electromagnetic Emission Analysis Attacks, and others. These attacks can compromise the security of your system, but with FortifyIQ’s IP Cores, you can be sure that your System on Chip is protected against physical attacks.

No need to waste time and money analyzing and modifying your design. Simply integrate FortifyIQ’s IP Cores into your SoC and enjoy peace of mind knowing your system is protected against even the most sophisticated security threats. Choose FortifyIQ for the ultimate AES protection solution.

FortifyIQ’s IP catalog currently includes two families of products:

AES protected against SCA and FIA, including SIFA

HMAC SHA2 protected against SCA and FIA, including SIFA

Both families are unique in the market. FortifyIQ offers both protected IP cores and software libraries with proven algorithmic protections. FortiCrypt’s exceptional performance enables encryption/decryption of HD video streams on low-end CPUs, and it can be used even for devices already in the field which have no or insufficient protection.

Introducing FortifyIQ’s Protected AES Solutions, the ultimate solution for unparalleled security and performance. All FortiCrypt products (including the FortiCrypt SW library) provide ultra-high level protection against side-channel attacks (SCA) and fault injection attacks (FIA) including SIFA without sacrificing performance, latency, or gate count.

All FortiCrypt products utilize masking methods based on finite field arithmetic that implement attack resistance without incurring extra latency costs.

The core protection mechanism was verified using the rigorous Test Vector Leakage Assessment (TVLA) methodology at 1B traces, both by FortifyIQ and by a third-party Common Criteria lab. Resistance to attacks was validated analytically and on a physical device. The cores are fully synthesizable and do not require custom cells or special place & route handling.

Choose from our various configurations, including ultra-low latency, ultra-high performance, ultra-low gate count, and a balanced solution that offers a perfect balance of security, performance, gate count, and power consumption.

Our balanced solution provides the same latency and performance as unprotected IP cores and has a gate count comparable to them. This in accordance with the original AES design goal.

The user can choose a stand-alone cryptographic core or one integrated with a register block attached to one of the AMBA, AXI, or APB buses.

Our technology has been rigorously compared to other solutions based on academic papers. The results show that FortifyIQ delivers a fifteen-fold increase in throughput per area and requires thirty times fewer random bits, making us the clear choice for companies looking for superior protection and performance.

Our software IP cores can be used to enhance the protection of already manufactured devices, even those already in the field. These devices may not have had sufficient protection initially or have become vulnerable over time.

Our FortiCrypt IP Cores have passed the most stringent evaluation of a Common Criteria accredited leading laboratory.

Whether you need security, performance, low power consumption, low gate count or a combination of all four, FortifyIQ has the solution for you. Our customers shared their specific technical requirements with us, and we were successful in delivering solutions that met those needs, while our competitors were unable to do so. So why settle for anything less?

Choose FortifyIQ for the best security and performance on the market.

FortiMac is a cutting-edge IP core solution that delivers a secure implementation of HMAC SHA2 that provides ultra-strong protection against SCA and FIA using a very low number of standard digital gates. The protection method is based on the Threshold Implementation (TI) paradigm; thus it provides a robust protection against side channel (SC) and fault injection (FI) attacks. Resistance to attacks was validated analytically and on a physical device. FortiMac stands as the only solution of its kind in the market.

Whether you need hardware or software implementation, FortiMac provides unparalleled security for your most critical applications.

Choose FortiMac for the ultimate protection in the face of today’s evolving threat landscape.