Interview: Securing the Post-Quantum Era

The industry is rapidly moving toward post-quantum cryptography (PQC). Why does it need protection if it’s supposed to be “quantum-safe”?

That’s a critical question. PQC algorithms such as ML-KEM (Kyber) and ML-DSA (Dilithium), now standardized by NIST in FIPS 203 and FIPS 204, are designed to resist mathematical attacks by quantum computers. But their implementations are highly vulnerable to physical attacks, particularly side-channel and fault-injection attacks. In fact, several masking-based PQC implementations have been broken in academia, some with only a single trace. These are not hypothetical risks; they’re practical, exploitable vulnerabilities.

How urgent is this problem?

Very. Adversaries are already harvesting encrypted data today to decrypt later, once quantum computers become capable of breaking RSA and ECC. That makes protecting PQC not just a future requirement but an immediate one, especially for high-assurance systems, critical infrastructure, and connected devices with long operational lifetimes. Regulators are also catching up quickly: NIST, ETSI, and national certification bodies are seriously considering this topic and are expected to update the regulations/standards to mandate SCA/FIA protection of PQC implementations, incorporating side-channel and fault-injection requirements into post-quantum compliance.

What makes FortifyIQ’s approach different from masking-based protections?

We use an algorithmic hardening approach that operates at the mathematical level of the implementation, not just at the masking level. It’s the same family of techniques we’ve validated for our AES and HMAC SHA-2 cores, which passed AVA.VAN.5 evaluation by a Common Criteria lab. The protection is intrinsic to the design and validated as robust against side-channel and fault-injection attacks. Because of this approach, our PQC solutions achieve resilience comparable to hardened hardware, without the large overhead typically associated with masking.

Let’s talk about performance. What’s the impact of these protections?

In software, our SCA/FIA-resistant PQC implementations are on par with the performance of naïve PQC implementations, with the only overhead in code size (under 10 percent), whereas our data RAM requirement is lower than that of naïve PQC. In hardware, we can match the performance of naive PQC implementations. Alternatively, for resourceconstrained devices, we can keep the area comparable to naive PQC implementations. The implementation is fully soft IP, and the integration is identical to any standard macro, with no special constraints or tool requirements.

You mentioned both hardware and software implementations. How are they deployed?

Our FortiPQC suite includes OTA (over-the-air) deployable software libraries, hardware IP cores, and hybrid CryptoBoxes that combine both PQC and traditional cryptography – AES, HMAC SHA2, RSA, and ECC, all hardened against side-channel and fault-injection attacks. The hybrids are particularly important because we’re in a long transition period: many deployed devices will still require RSA or ECC for compatibility. Our CryptoBoxes and Roots of Trust provide that dual capability efficiently, without duplication of logic or power penalties. Our asymmetric cryptography, including the PQC, is FOTA (firmware-over-the-air) updatable.

Are these implementations updatable?

Yes. Both our software and our asymmetric cryptography, RSA/ECC and PQC in hardware, are designed for secure OTA (Over-The-Air) and FOTA (Firmware-OTA) updates. That’s essential for PQC because new attacks are likely to emerge in this new technology.

Can FortifyIQ tailor its hardware and software cryptography IPs to specific customer requirements?

Yes. FortifyIQ works like a security boutique. All our hardware IP, software libraries, and hybrid CryptoBoxes or Roots of Trust can be customized throughout the project, right up to tape-out, to match specific device constraints, performance goals, or certification needs. Our customers can balance performance, area, and power as they see fit. They can include only the cryptographic blocks they need (AES, HMAC-SHA2, PKA, or PQC) or combine them with our software libraries, allowing for seamless switching between hardware and software under a unified architecture. This flexibility is especially useful during transition periods. And importantly, every version maintains certifiable protection against side-channel and fault-injection attacks. This approach ensures that each system, from small IoT devices to high-performance cloud or edge platforms, receives optimized, high-assurance cryptography tailored to its environment.

What types of customers or systems is this designed for?

It spans everything from embedded controllers and IoT devices to cloud and data-center accelerators. The same FortiPQC architecture scales with power and performance targets, from microcontroller-class to multi-gigabit throughput. Our Roots of Trust even supports on-the-fly encryption with full SCA/FIA resistance, which is increasingly demanded for chiplet-based architectures and heterogeneous systems.

What’s your view on the bigger picture? Where is PQC protection headed?

Post-quantum migration is unavoidable, but secure post-quantum deployment isn’t automatic. Protecting PQC against physical attacks is as fundamental as adopting the algorithms themselves.

Can you summarize FortifyIQ’s overall goal with FortiPQC?

Our goal with FortiPQC, across software, hardware, and hybrid systems, is to make post-quantum protection intrinsic, certifiable, and practical for every device class. We achieve this by applying algorithmic protections that leave our protected devices to rival the PPA (Power-Performance-Area) of unprotected implementations, even in the most constrained configurations, only doubling latency without power or area penalties. FortiPQC delivers high-assurance post-quantum cryptography ready for real-world deployment.

What standards and certifications does FortiPQC address?

FortiPQC aligns with FIPS 203, 204, 205, NIST SP 800-208, and ETSI TS 103 619, and is engineered for FIPS 140-3 Level 4, Common Criteria AVA.VAN.5, and SESIP Level 5. Every implementation, hardware or software, is designed for certifiability from the start.

About FortifyIQ

FortifyIQ engineers certifiable cryptographic IP cores, software libraries, and roots of trust with traditional and post-quantum algorithms, all hardened against side-channel and fault injection attacks, without compromising performance, area, or energy efficiency. Our solutions are foundry- and platform-agnostic, integrating securely across a wide spectrum, from smart cards and IoT devices to AI accelerators and cloud systems. Backed by a strong portfolio of granted and pending patents, deep cryptographic research and formal and practical security proofs, FortifyIQ’s IP is developed and validated using our own pre- and post-silicon EDA tools, enabling systematic evaluation of physical attack resilience.

FortifyIQ delivers advanced cryptography that is certifiable, reliable, and built to meet the challenges of high-assurance, real-world applications.

Open as PDF

FortifyIQ AES Algorithm
AVA_VAN.5 Evaluation & Validation Summary
SGS Brightsight Common Criteria Laboratory
Summary. The leakage analysis (Welch t-test) on over 30 million traces did not show statistically significant first- and second-order differences between trace sets with fixed and random inputs. The template-based DPA analysis, on the pseudo-random trace set for the profiling phase (15 million traces) and on a sub-set of 300k fix input traces for matching phase targeting the first-round S-box output, and template attack on ciphertext, did not indicate any potential information leakage.”
“The results for the soft IP presented in the report were obtained on the TOE which is the basic hardware implementation of the soft IP without additional levels of security (e.g. that are present in a secure silicon layout). Therefore the internal strength of the soft IP itself was evaluated. This indicates that the investigated features and parameters of the soft IP implementation should be robust against SCA and fault injection attacks in different implementations including ASIC. Nevertheless, according to the Common Criteria rules, the strength of the final composite product must be evaluated on its own
Request Technical Details