Hardware-Security IP
Foundation:
From IoT to Cloud

Side-Channel and Fault Injection

Protection with FortifyIQ

A straightforward implementation of cryptography
is inherently vulnerable
to physical attacks.

FortifyIQ provides robust protection of cryptographic implementations—from classical to post-quantum—against side-channel and fault injection attacks. Delivering high performance with minimal overhead, it is suited for edge AI, embedded systems, and secure hardware.

Whether you're designing chips, protecting AI, or meeting compliance, our solutions are built for security, performance, and efficiency.

EDA Tools for Security Assessment and Verification

Detect and analyze side-channel and fault injection vulnerabilities, pinpointing their sources to the leaking module and even gate. They are continuously updated to include new attacks. For validating the efficiency of in-house developed cryptographic modules both pre- and post-silicon, and to verify the correctness of third-party IP integration — where integration bugs sometimes introduce new vulnerabilities.

Security Cryptographic
HW IP Cores

Portfolio of Soft Macro cryptographic IPs for ASIC/FPGA, secured against side-channel and fault injection attacks. It includes a complete range of standard and post-quantum cryptography, enhanced with unique patented countermeasures that ensure the highest level of security without compromising critical performance, power consumption, or size.

Root of Trust (RoT)

The security enclave sub-system family delivers scalable protection, from cost-effective, low-power designs for IoT devices to high-performance cloud AI servers with extensive on-the-fly encryption capabilities with highest level of protection against security compliance.

Software
Libraries

High-performance and adaptable, these libraries are optimized for deployed systems as well as budget-conscious or resource-constrained devices. They are configurable for various use cases and perform exceptionally well on edge devices, enabling secure operations even on limited hardware.

Protection of AI-Models

AI models are not secure with unhardened cryptography. Our security solutions protect AI models against theft and tampering, ensuring the safe deployment of AI models in applications, while maintaining performance efficiency.

Leading Security Compliance for Demanding Applications

At FortifyIQ, we deliver powerful, efficient security solutions for extreme
use cases where others fall short. Our technology safeguards against
side-channel (SCA) and fault-injection (FI) attacks without
compromising on performance, power, or space.

Why Choose
FortifyIQ?

Professor
Adi Shamir, PhD.

The ‘S’ in RSA and
Turing Prize Winner

Uncompromised
security
where

it matters most.

Conference Papers

Whitepapers

Videos

News & Updates

April 9, 2023

Results of FortifyIQ research, described in the paper, show that any implementation of HMAC-SHA-2, even in pure parallel hardware, is vulnerable to side…

April 9, 2023

Yaacov Belenky

Chief Innovation Officer, FortifyIQ

SEMISRAEL Tech Webinar

April 14, 2022

This is an academic paper describing a protection method for AES which is very efficient, and configurable for any application…

February 10, 2022

Early in the year, everyone expected that the availability of COVID vaccines would signal the start of a return to normal, but that has certainly not been the case. Now the industry is taking a longer-term view about how to transform business