Expert insights, academic papers, and videos to fuel your chip-to-cloud security compliance.
Learn MoreHigh-assurance cryptographic implementations of AES, HMAC, PKA, PQC, CryptoBox, and Root-of-Trust families, and software libraries, all exceptionally efficient (PPA-optimized).
See MoreProvide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
Secures both new and already-deployed devices, including those without hardware countermeasures, and is proven in millions of systems.
Provides ultra-strong protection against SCA, FIA, and cache attacks.
What are side-channel and fault-injection attacks, and why would your device need protection against them? Etc.
Provides a comprehensive suite of post-quantum cryptography hardware, including CryptoBoxes, IP cores, and Root-of-Trust modules.
Provide high-assurance cryptographic protection, engineered for AVA_VAN.5 compliance and designed for high-security certification.
CryptoBoxes and Roots of Trust (RoTs) integrate post-quantum and classical cryptography in a unified, high-assurance architecture.
Why post-quantum cryptography matters? Etc.
The most popular myths and facts about post-quantum cryptography.
Enables engineers to evaluate and strengthen hardware designs against fault injection attacks, e.g., DFA, SIFA, and AFA.
Pre-silicon EDA tool suite designed to identify, analyze, and mitigate side-channel vulnerabilities in hardware designs from RTL.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
Mathematically sound and practically validated patented/patent-pending countermeasures, ensuring resistance to the most advanced physical attacks.
How does FortifyIQ validate resistance to side-channel and fault-injection attacks? Etc.
Resilient cryptographic protection for payment systems, digital banking, and secure financial infrastructure.
Secure cryptographic foundations for identity systems, defense infrastructure, and digital government platforms.
From payment cards to e-passports, SIMs, and digital ID tokens, smart cards and digital identity solutions power critical transactions.
Securing network infrastructure, subscriber identity, and cloud-native telecommunication systems.
Automotive Cybersecurity IPs and Tools for ECUs, ADAS, AV and In-Vehicle-Infotainment (IVI) Systems.
Robust, certifiable security solutions for next-generation industrial automation and control systems.
Cryptographic security tailored to the needs of energy systems: robust protection against side-channel and fault injection attacks.
Safeguarding energy, water, and transportation systems with certifiable hardware and software security.
Cryptographic protection engineered for the longevity, safety, and regulatory demands of rail and transportation systems.
Ultra-high-throughput, physically secure cryptographic IP for cloud and data center silicon.
Cryptographic protection for IoT systems, with unmatched resistance to side-channel analysis and fault injection attacks.
Secure cryptography and OTA updates for ultra-constrained, mission-critical medical electronics.
Robust, efficient cryptographic protections for media platforms that resist real-world physical attacks with minimal performance tradeoffs.
Cryptographic solutions purpose-built for silicon IP protection, licensing enforcement, and clone detection.
In healthcare, we provide comprehensive cryptographic solutions — from traditional to post-quantum cryptography.
Expert insights, academic papers, and videos to fuel your chip-to-cloud security compliance.
Learn MoreThis section features FortifyIQ's academic publications, presenting AES protection techniques against side-channel and fault injection attacks and side-channel attacks on SHA-2-based HMAC.
Learn MoreThis section demonstrates how FortifyIQ validates cryptographic solutions, compares ours against other secure cores, and showcases FortiEDA for evaluating and developing secure designs.
Learn MoreOur explanatory videos break down complex hardware security concepts into clear, visual stories, showcasing how FortifyIQ's technologies detect and prevent side-channel and fault-injection attacks.
Learn MoreStay informed with our latest updates, announcements, and insights, including industry developments, company milestones, and important highlights shaping our work and community.
Learn MoreRead our official statements and announcements for media and stakeholders, featuring key company updates, partnerships, product launches, and other important organizational news.
Learn MoreJoin our online sessions to explore expert insights, practical knowledge, and discussions on relevant topics. Watch live or access recordings to learn from industry professionals.
Learn MoreDiscover upcoming conferences, meetings, and special gatherings where you can connect with our team, partners, and community members, and stay engaged with our latest initiatives.
Learn MorePioneers in hardware-based security innovation, combining cutting-edge cryptography with advanced defense mechanisms, dedicated to safeguarding the digital world’s most critical assets.
Learn MoreOur services ensure that security, performance, power, and area are balanced optimally, without compromising certifiable high-assurance protection against side-channel and fault-injection attacks.
Learn MoreAt FortifyIQ, our R&D team is a unique blend of industry veterans with deep expertise in mathematics and cybersecurity, alongside talented young engineers who bring fresh perspectives and innovative thinking.
Learn MoreWe seek exceptional individuals who are passionate about tackling the toughest challenges facing hardware manufacturers today and ready to take on whatever comes next.
Join UsThe industry is rapidly moving toward post-quantum cryptography (PQC). Why does it need protection if it’s supposed to be “quantum-safe”?
That’s a critical question. PQC algorithms such as ML-KEM (Kyber) and ML-DSA (Dilithium), now standardized by NIST in FIPS 203 and FIPS 204, are designed to resist mathematical attacks by quantum computers. But their implementations are highly vulnerable to physical attacks, particularly side-channel and fault-injection attacks. In fact, several masking-based PQC implementations have been broken in academia, some with only a single trace. These are not hypothetical risks; they’re practical, exploitable vulnerabilities.
How urgent is this problem?
Very. Adversaries are already harvesting encrypted data today to decrypt later, once quantum computers become capable of breaking RSA and ECC. That makes protecting PQC not just a future requirement but an immediate one, especially for high-assurance systems, critical infrastructure, and connected devices with long operational lifetimes. Regulators are also catching up quickly: NIST, ETSI, and national certification bodies are seriously considering this topic and are expected to update the regulations/standards to mandate SCA/FIA protection of PQC implementations, incorporating side-channel and fault-injection requirements into post-quantum compliance.
What makes FortifyIQ’s approach different from masking-based protections?
We use an algorithmic hardening approach that operates at the mathematical level of the implementation, not just at the masking level. It’s the same family of techniques we’ve validated for our AES and HMAC SHA-2 cores, which passed AVA.VAN.5 evaluation by a Common Criteria lab. The protection is intrinsic to the design and validated as robust against side-channel and fault-injection attacks. Because of this approach, our PQC solutions achieve resilience comparable to hardened hardware, without the large overhead typically associated with masking.
Let’s talk about performance. What’s the impact of these protections?
In software, our SCA/FIA-resistant PQC implementations are on par with the performance of naïve PQC implementations, with the only overhead in code size (under 10 percent), whereas our data RAM requirement is lower than that of naïve PQC. In hardware, we can match the performance of naive PQC implementations. Alternatively, for resourceconstrained devices, we can keep the area comparable to naive PQC implementations. The implementation is fully soft IP, and the integration is identical to any standard macro, with no special constraints or tool requirements.
You mentioned both hardware and software implementations. How are they deployed?
Our FortiPQC suite includes OTA (over-the-air) deployable software libraries, hardware IP cores, and hybrid CryptoBoxes that combine both PQC and traditional cryptography – AES, HMAC SHA2, RSA, and ECC, all hardened against side-channel and fault-injection attacks. The hybrids are particularly important because we’re in a long transition period: many deployed devices will still require RSA or ECC for compatibility. Our CryptoBoxes and Roots of Trust provide that dual capability efficiently, without duplication of logic or power penalties. Our asymmetric cryptography, including the PQC, is FOTA (firmware-over-the-air) updatable.
Are these implementations updatable?
Yes. Both our software and our asymmetric cryptography, RSA/ECC and PQC in hardware, are designed for secure OTA (Over-The-Air) and FOTA (Firmware-OTA) updates. That’s essential for PQC because new attacks are likely to emerge in this new technology.
Can FortifyIQ tailor its hardware and software cryptography IPs to specific customer requirements?
Yes. FortifyIQ works like a security boutique. All our hardware IP, software libraries, and hybrid CryptoBoxes or Roots of Trust can be customized throughout the project, right up to tape-out, to match specific device constraints, performance goals, or certification needs. Our customers can balance performance, area, and power as they see fit. They can include only the cryptographic blocks they need (AES, HMAC-SHA2, PKA, or PQC) or combine them with our software libraries, allowing for seamless switching between hardware and software under a unified architecture. This flexibility is especially useful during transition periods. And importantly, every version maintains certifiable protection against side-channel and fault-injection attacks. This approach ensures that each system, from small IoT devices to high-performance cloud or edge platforms, receives optimized, high-assurance cryptography tailored to its environment.
What types of customers or systems is this designed for?
It spans everything from embedded controllers and IoT devices to cloud and data-center accelerators. The same FortiPQC architecture scales with power and performance targets, from microcontroller-class to multi-gigabit throughput. Our Roots of Trust even supports on-the-fly encryption with full SCA/FIA resistance, which is increasingly demanded for chiplet-based architectures and heterogeneous systems.
What’s your view on the bigger picture? Where is PQC protection headed?
Post-quantum migration is unavoidable, but secure post-quantum deployment isn’t automatic. Protecting PQC against physical attacks is as fundamental as adopting the algorithms themselves.
Can you summarize FortifyIQ’s overall goal with FortiPQC?
Our goal with FortiPQC, across software, hardware, and hybrid systems, is to make post-quantum protection intrinsic, certifiable, and practical for every device class. We achieve this by applying algorithmic protections that leave our protected devices to rival the PPA (Power-Performance-Area) of unprotected implementations, even in the most constrained configurations, only doubling latency without power or area penalties. FortiPQC delivers high-assurance post-quantum cryptography ready for real-world deployment.
What standards and certifications does FortiPQC address?
FortiPQC aligns with FIPS 203, 204, 205, NIST SP 800-208, and ETSI TS 103 619, and is engineered for FIPS 140-3 Level 4, Common Criteria AVA.VAN.5, and SESIP Level 5. Every implementation, hardware or software, is designed for certifiability from the start.
About FortifyIQ
FortifyIQ engineers certifiable cryptographic IP cores, software libraries, and roots of trust with traditional and post-quantum algorithms, all hardened against side-channel and fault injection attacks, without compromising performance, area, or energy efficiency. Our solutions are foundry- and platform-agnostic, integrating securely across a wide spectrum, from smart cards and IoT devices to AI accelerators and cloud systems. Backed by a strong portfolio of granted and pending patents, deep cryptographic research and formal and practical security proofs, FortifyIQ’s IP is developed and validated using our own pre- and post-silicon EDA tools, enabling systematic evaluation of physical attack resilience.
FortifyIQ delivers advanced cryptography that is certifiable, reliable, and built to meet the challenges of high-assurance, real-world applications.