⌂ 〉 Cryptographic Hardware IP Cores 〉 Roots of Trust
These fully customizable Roots of Trust are designed for a wide range of applications. They are hardened against side-channel and fault injection attacks, ensuring strong security even in highly constrained or hostile environments, or where insider attacks are a threat. The portfolio spans variants optimized for IoT, cloud, chiplets, balanced designs, and edge-AI, providing flexible integration and performance scaling to match system needs.
These fully customizable Roots of Trust are designed for a wide range of applications. They are hardened against side-channel and fault injection attacks, ensuring strong security even in highly constrained or hostile environments, or where insider attacks are a threat. The portfolio spans variants optimized for IoT, cloud, chiplets, balanced designs, and edge-AI, providing flexible integration and performance scaling to match system needs.
Built on FortiCryptoBox cores (AES, HMAC, PKA, PQC)
Minimal area and power despite full-featured secure services
Compliance-ready, certifiable at the highest security levels, with full documentation supporting FIPS 140‑3, Common Criteria AVA_VAN.5, SESIP/PSA-class RoT requirements, and post-quantum readiness, streamlining audits and formal certification.
Soft-macro & node-agnostic
Validated high assurance in internal lab, via FortiEDA, showing robust resistance to side-channel and fault injection attacks
Unified API across software and hardware for AES, HMAC, ECC/RSA, and PQC, enabling seamless migration between SW and HW implementations without changing the security stack, preserving secure‑boot, attestation, key‑management, and lifecycle flow
FortiTrust integrates as a modular RoT subsystem with standard interfaces, and can be tailored for different architectural requirements.
Designed for FIPS 140-3/4, SESIP 5, and CC EAL6+ (AVA_VAN.5).
FortiTrust is a compact, configurable Root of Trust, certifiable at the highest security levels, with best-in-class power, performance, and latency for both classical and post-quantum cryptography.