- Video
Semiconductor Security Simplified: Tech Efficient, Simple, Scalable Solutions for SoCs and IoT
Carry-based Differential Power Analysis (CDPA) and its Application to Attacking HMAC-SHA-2
In this paper, FortifyIQ introduces Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes involving arithmetical addition. This methodology is applied to what is believed to...
In this paper, FortifyIQ introduces Carry-based Differential Power Analysis (CDPA), a novel methodology that allows for attacking schemes involving arithmetical addition. This methodology is applied to what is believed to be the first published full-fledged attack on HMAC-SHA-2 which does not require a profiling stage.
Read more
First Full-Fledged
Side Channel Attack
on HMAC-SHA-2
FortifyIQ presents a novel practical template attack on HMAC-SHA-2 intended primarily against its implementations in hardware. Side-channel attacks pose a threat to cryptographic algorithms. HMAC is an important use case...
FortifyIQ presents a novel practical template attack on HMAC-SHA-2 intended primarily against its implementations in hardware. Side-channel attacks pose a threat to cryptographic algorithms. HMAC is an important use case of a hash function, in which the input is partially secret and thus unknown to the attacker. Despite a few publications that discuss applications of power analysis techniques to attack HMAC-SHA-2, this is the first generic method that shows a full attack on its hardware implementation.
Read more
RAMBAM: A New Very Compact and Efficient Protection of AES against SC and FI attacks
This is an academic paper describing a protection method for AES which is very efficient, and configurable for any application. It introduces RAMBAM, an innovative algebraic masking technique designed to...
This is an academic paper describing a protection method for AES which is very efficient, and configurable for any application. It introduces RAMBAM, an innovative algebraic masking technique designed to protect against side-channel attacks and SIFA1.
Read more
STORM — Small Table Oriented Redundancy-based SCA Mitigation for AES
STORM effectively solves the long-standing challenge of combining high security against SCA with low gate count and high performance for AES implementations by offering a different tradeoff (memory utilization) that...
STORM effectively solves the long-standing challenge of combining high security against SCA with low gate count and high performance for AES implementations by offering a different tradeoff (memory utilization) that may be preferable to RAMBAM in many practical cases.
Read more
Fault Injection Studio
Fault Injection Attacks pose a growing threat to the security of hardware systems, particularly in cryptographic
Fault Injection Attacks pose a growing threat to the security of hardware systems, particularly in cryptographic contexts where they can lead to full key recovery. While simple FIAs can often be mitigated through detection mechanisms, cryptographic FIAs — especially ineffective fault attacks — require deeper, design-level countermeasures. FortifyIQ’s Fault Injection Studio addresses this challenge with a comprehensive EDA solution for evaluating and improving algorithmic protections against fault injection attacks.
Read more
FortifyCrypt’s Unique Capabilities and a Comparison with the Market
Explore FortifyIQ’s AES with RAMBAM protection, providing top-tier defense against side-channel and fault injection attacks.
Explore FortifyIQ’s AES with RAMBAM protection, providing top-tier defense against side-channel and fault injection attacks.
Read more
HOW TO STEAL A GLOBAL COMPANY’S BUSINESS BY BREAKING INTO JUST ONE OF THEIR DEVICES
Discover a new approach to developing protection for smart cards against Differential Power Analysis (DPA) attacks,
Discover a new approach to developing protection for smart cards against Differential Power Analysis (DPA) attacks, allowing manufacturers to cut protection costs and save time during development.
Read more
GLOBAL CRYPTOGRAPHIC KEYS IN THE IOT WORLD AND THE THREATS THEY PRESENT
Of the various kinds of side-channel attacks, Differential Power Analysis (DPA) is the cheapest to deploy
Of the various kinds of side-channel attacks, Differential Power Analysis (DPA) is the cheapest to deploy with potentially the highest amount of damage to the manufacturer. What can be done to protect IoT devices from such attacks?
Read moreAttackers can now breach your device for just a few hundred dollars unless robust security measures are in place. Watch our webinar to learn how our solution ensures you no longer have to compromise between security and functionality.
Get a deep dive into the world of FortifyIQ’s protected IP cores and ultra-high bandwidth engines based on these IP cores. Learn all about the different core configurations and much more in this introductory video.
Learn how SideChannel Studio helps you find the source of side-channel leakage through a series of explanatory screenshots. Watch this detailed video now!