This section features FortifyIQ's academic publications, presenting AES protection techniques against side-channel and fault injection attacks and side-channel attacks on SHA-2-based HMAC.
Learn MoreHigh-assurance cryptographic implementations of AES, HMAC, PKA, PQC, CryptoBox, and Root-of-Trust families, plus software libraries, all exceptionally efficient (PPA-optimized).
See MoreProvide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
Secures both new and already-deployed devices, including those without hardware countermeasures, and is proven in millions of systems.
Provides ultra-strong protection against SCA, FIA, and cache attacks.
What are side-channel and fault-injection attacks, and why would your device need protection against them? Etc.
Provides a comprehensive suite of post-quantum cryptography hardware, including CryptoBoxes, IP cores, and Root-of-Trust modules.
Provide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
CryptoBoxes and Roots of Trust (RoTs) integrate post-quantum and classical cryptography in a unified, high-assurance architecture.
Why post-quantum cryptography matters? Etc.
The most popular myths and facts about post-quantum cryptography.
Enables engineers to evaluate and strengthen hardware designs against fault injection attacks, e.g., DFA, SIFA, and AFA.
Pre-silicon EDA tool suite designed to identify, analyze, and mitigate side-channel vulnerabilities in hardware designs from RTL.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
How does FortifyIQ validate resistance to side-channel and fault-injection attacks? Etc.
Resilient cryptographic protection for payment systems, digital banking, and secure financial infrastructure.
Secure cryptographic foundations for identity systems, defense infrastructure, and digital government platforms.
From payment cards to e-passports, SIMs, and digital ID tokens, smart cards and digital identity solutions power critical transactions.
Securing network infrastructure, subscriber identity, and cloud-native telecommunication systems.
Automotive Cybersecurity IPs and Tools for ECUs, ADAS, AV and In-Vehicle-Infotainment (IVI) Systems.
Robust, certifiable security solutions for next-generation industrial automation and control systems.
Cryptographic security tailored to the needs of energy systems: robust protection against side-channel and fault injection attacks.
Safeguarding energy, water, and transportation systems with certifiable hardware and software security.
Cryptographic protection engineered for the longevity, safety, and regulatory demands of rail and transportation systems.
Ultra-high-throughput, physically secure cryptographic IP for cloud and data center silicon.
Cryptographic protection for IoT systems, with unmatched resistance to side-channel analysis and fault injection attacks.
Secure cryptography and OTA updates for ultra-constrained, mission-critical medical electronics.
Robust, efficient cryptographic protections for media platforms that resist real-world physical attacks with minimal performance tradeoffs.
Cryptographic solutions purpose-built for silicon IP protection, licensing enforcement, and clone detection.
In healthcare, we provide comprehensive cryptographic solutions — from traditional to post-quantum cryptography.
This section features FortifyIQ's academic publications, presenting AES protection techniques against side-channel and fault injection attacks and side-channel attacks on SHA-2-based HMAC.
Learn MoreThis section demonstrates how FortifyIQ validates cryptographic solutions, compares ours against other secure cores, and showcases FortiEDA for evaluating and developing secure designs.
Learn MoreOur explanatory videos break down complex hardware security concepts into clear, visual stories, showcasing how FortifyIQ's technologies detect and prevent side-channel and fault-injection attacks.
Learn MorePioneers in hardware-based security innovation, combining cutting-edge cryptography with advanced defense mechanisms, dedicated to safeguarding the digital world’s most critical assets.
Learn MoreOur services ensure that security, performance, power, and area are balanced optimally, without compromising certifiable high-assurance protection against side-channel and fault-injection attacks.
Learn MoreAt FortifyIQ, our R&D team is a unique blend of industry veterans with deep expertise in mathematics and cybersecurity, alongside talented young engineers who bring fresh perspectives and innovative thinking.
Learn MoreWe seek exceptional individuals who are passionate about tackling the toughest challenges facing hardware manufacturers today and ready to take on whatever comes next.
Join Us
Conference on Cryptographic Hardware and Embedded Systems
NEWTON, MA – September 29, 2021 – There is a lot of secret data around us, some less valuable and some more valuable. The most valuable secrets, such as cryptographic keys, should be given the best possible protection – and that protection starts in hardware, rather than in software. This is where FortifyIQ, the leader in pre-silicon security verification solutions, comes in. With FortifyIQ solutions, the entire security verification cycle is performed at the pre-silicon stage, avoiding the expensive and time-consuming process of analyzing and correcting security vulnerabilities with a manufactured device, as well as potential re-spins and schedule delays.
“We met a significant number of manufacturers and potential prospects who came to our table to discuss their security needs and manufacturing challenges. Generally, we had two types of reaction: one was a disbelief that our solution actually solves the vulnerability to power consumption-based side-channel attacks on the microchip’s secure element. This type of attack is known to exploit an intrinsic property of any electronic device – its consumption of electric power – and typical solutions can level power consumption to a certain extent, and only up to a certain number of traces.
FortifyIQ’s solution is based on a different principal and perpetrators cannot feasibly devise an attack that would break into the secure element of the microchip designed with the help of our solutions.
Another reaction was surprise and excitement to see our solution, to try it out. Most conference attendees were responsible for device security and device engineering and have been dealing with the costly process of designing the side-channel attack vulnerability out of their SoCs for decades. It’s not unexpected that they are skeptical, and surprised, and excited.”
Yuri Kreimer, FortifyIQ’s CTO and Co-Founder notes: “We had a very positive reaction from the expert community. The quick speed of the analysis and resolution of side-channel attack vulnerability in chip design was the most frequently mentioned feedback. The amount of information received by the design security engineer while using our tools was also mentioned as a valuable new feature.” Following the event, FortifyIQ is pursuing some great conversations that were started at the event and is setting up trials with the prospective clients.
FortifyIQ was exhibiting and was a Silver Sponsor at CHES 2019 in Atlanta, GA on August 25-28. Cryptographic Hardware and Embedded Systems (CHES) is an annual global conference for cryptography research, focusing on the implementation of cryptographic algorithms, that has been taking place since 1999. It attracts almost 400 researchers and industry experts from around the world.